General

  • Target

    eae8b2c0cfbfb4275e7756d14f057c8f631a10da0a9835e7cdd03c9891d4b41b

  • Size

    405KB

  • Sample

    211125-njjrzaacg4

  • MD5

    1265e493588ad3a50596b447df2a33c6

  • SHA1

    3a50172f7c770dc53f18f02a45f663f6ac0e85c2

  • SHA256

    eae8b2c0cfbfb4275e7756d14f057c8f631a10da0a9835e7cdd03c9891d4b41b

  • SHA512

    ceca8d45a05b6a022887a63cf7a6ca782364b5a1d163cf066a0a55a3a722f83d7fd31a430a17cb90ecbf46b3db9b84d3880581d66f302d160b7ad3e81aa4dc97

Malware Config

Extracted

Family

redline

Botnet

Pubdate

C2

193.56.146.64:65441

Targets

    • Target

      eae8b2c0cfbfb4275e7756d14f057c8f631a10da0a9835e7cdd03c9891d4b41b

    • Size

      405KB

    • MD5

      1265e493588ad3a50596b447df2a33c6

    • SHA1

      3a50172f7c770dc53f18f02a45f663f6ac0e85c2

    • SHA256

      eae8b2c0cfbfb4275e7756d14f057c8f631a10da0a9835e7cdd03c9891d4b41b

    • SHA512

      ceca8d45a05b6a022887a63cf7a6ca782364b5a1d163cf066a0a55a3a722f83d7fd31a430a17cb90ecbf46b3db9b84d3880581d66f302d160b7ad3e81aa4dc97

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks