General

  • Target

    8c29ea9da60f50c3412b4e7c239402830b087e2dfdfb1226574881bf3ed18e5d

  • Size

    307KB

  • Sample

    211120-mskvyscffq

  • MD5

    fe1300d54cfbf95baf658c0a0463ebd3

  • SHA1

    88914030aba7f39b9a844df0f341bbd634067696

  • SHA256

    8c29ea9da60f50c3412b4e7c239402830b087e2dfdfb1226574881bf3ed18e5d

  • SHA512

    55294738fd57e8070673bfa7c8de1e482c69b5bdb2ef08ce2949096b02e8b9503dc6e24e96fd3e44ae0e55dfab7d8489f9b954ef8412cb78e74a1c4356b89478

Malware Config

Extracted

Family

redline

Botnet

Sleeze

C2

194.127.179.0:42417

Targets

    • Target

      8c29ea9da60f50c3412b4e7c239402830b087e2dfdfb1226574881bf3ed18e5d

    • Size

      307KB

    • MD5

      fe1300d54cfbf95baf658c0a0463ebd3

    • SHA1

      88914030aba7f39b9a844df0f341bbd634067696

    • SHA256

      8c29ea9da60f50c3412b4e7c239402830b087e2dfdfb1226574881bf3ed18e5d

    • SHA512

      55294738fd57e8070673bfa7c8de1e482c69b5bdb2ef08ce2949096b02e8b9503dc6e24e96fd3e44ae0e55dfab7d8489f9b954ef8412cb78e74a1c4356b89478

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks