General

  • Target

    62aeb64c1246124c98369a008bd36e3d8c477480aa8247aba8586e96a8d4b2c5

  • Size

    781KB

  • Sample

    211122-3xjfpacbf4

  • MD5

    4755ebeea9d87c4435318808c218c8e9

  • SHA1

    667a9a1d958e62e371e99b3881325f5a56163781

  • SHA256

    62aeb64c1246124c98369a008bd36e3d8c477480aa8247aba8586e96a8d4b2c5

  • SHA512

    6042c20f20546de6659af5bb32f1d33c41c7049c2bfed295679d8e738a36c3955753e8f69ea49909d3aba04f3194c7ac700c6fc49d660730b512a62170ddbca8

Malware Config

Extracted

Family

redline

Botnet

raketa2

C2

45.67.228.227:58696

Targets

    • Target

      62aeb64c1246124c98369a008bd36e3d8c477480aa8247aba8586e96a8d4b2c5

    • Size

      781KB

    • MD5

      4755ebeea9d87c4435318808c218c8e9

    • SHA1

      667a9a1d958e62e371e99b3881325f5a56163781

    • SHA256

      62aeb64c1246124c98369a008bd36e3d8c477480aa8247aba8586e96a8d4b2c5

    • SHA512

      6042c20f20546de6659af5bb32f1d33c41c7049c2bfed295679d8e738a36c3955753e8f69ea49909d3aba04f3194c7ac700c6fc49d660730b512a62170ddbca8

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Command and Control

Web Service

1
T1102

Tasks