General

  • Target

    307bada78066af6fe11113302ada2c9b86704040af605f7b0ed81d5d92ce00c3

  • Size

    404KB

  • Sample

    211125-abh9ksdhdn

  • MD5

    87c7cab609d9e2da53f4385ee980de4a

  • SHA1

    de43e1a74bbebb9b6d1aea59d8b776a3745aaf07

  • SHA256

    307bada78066af6fe11113302ada2c9b86704040af605f7b0ed81d5d92ce00c3

  • SHA512

    482345a01a85673b9b0dbb297b10012ef48272a89f5cd8bf1768fab6bc54877c8a8e5a135e8a817557de3fbcf86811a1149fb348630b82d48b6bb16d9d123316

Malware Config

Extracted

Family

redline

Botnet

Pubdate

C2

193.56.146.64:65441

Targets

    • Target

      307bada78066af6fe11113302ada2c9b86704040af605f7b0ed81d5d92ce00c3

    • Size

      404KB

    • MD5

      87c7cab609d9e2da53f4385ee980de4a

    • SHA1

      de43e1a74bbebb9b6d1aea59d8b776a3745aaf07

    • SHA256

      307bada78066af6fe11113302ada2c9b86704040af605f7b0ed81d5d92ce00c3

    • SHA512

      482345a01a85673b9b0dbb297b10012ef48272a89f5cd8bf1768fab6bc54877c8a8e5a135e8a817557de3fbcf86811a1149fb348630b82d48b6bb16d9d123316

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks