General

  • Target

    896943b525ecf0f976d385d3b2e7505a52581bec33ce9bca1deefa9520e0780a

  • Size

    104KB

  • Sample

    211110-t4y1aahga9

  • MD5

    0d432ccdabe7301ace2044446ae2bf19

  • SHA1

    f9f86f52532320e65c7bc6777ef14158927e3644

  • SHA256

    896943b525ecf0f976d385d3b2e7505a52581bec33ce9bca1deefa9520e0780a

  • SHA512

    e4c0c53d8c74da2a64f1bb78b047d8be21d79d9f41178e14f8af0cc07e2677b6ae56ca70fa7695040ced125af8974918713b875f4646889a3c7cb670202de2a7

Malware Config

Extracted

Family

redline

Botnet

777666777

C2

93.115.20.139:28978

Targets

    • Target

      896943b525ecf0f976d385d3b2e7505a52581bec33ce9bca1deefa9520e0780a

    • Size

      104KB

    • MD5

      0d432ccdabe7301ace2044446ae2bf19

    • SHA1

      f9f86f52532320e65c7bc6777ef14158927e3644

    • SHA256

      896943b525ecf0f976d385d3b2e7505a52581bec33ce9bca1deefa9520e0780a

    • SHA512

      e4c0c53d8c74da2a64f1bb78b047d8be21d79d9f41178e14f8af0cc07e2677b6ae56ca70fa7695040ced125af8974918713b875f4646889a3c7cb670202de2a7

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks