General

  • Target

    77eaecb0ff29c861a9c82a6f24d63802df608db2debc3db96ed9b26300cb4a1c

  • Size

    295KB

  • Sample

    211126-tm6c2addck

  • MD5

    b326385268ca128363c29d19abe252ca

  • SHA1

    16a5574dd4a8402ee32c6b447f7c35df58f17033

  • SHA256

    77eaecb0ff29c861a9c82a6f24d63802df608db2debc3db96ed9b26300cb4a1c

  • SHA512

    b84bb8d410df948d5045dd297176cc9cc5c6c381d91a7dee969a587681b9ccf2b01e46ca645bd275d719b5bccc922d7ab4c329b78a221c5308c9c68bca66122c

Malware Config

Extracted

Family

redline

Botnet

udptest

C2

193.56.146.64:65441

Targets

    • Target

      77eaecb0ff29c861a9c82a6f24d63802df608db2debc3db96ed9b26300cb4a1c

    • Size

      295KB

    • MD5

      b326385268ca128363c29d19abe252ca

    • SHA1

      16a5574dd4a8402ee32c6b447f7c35df58f17033

    • SHA256

      77eaecb0ff29c861a9c82a6f24d63802df608db2debc3db96ed9b26300cb4a1c

    • SHA512

      b84bb8d410df948d5045dd297176cc9cc5c6c381d91a7dee969a587681b9ccf2b01e46ca645bd275d719b5bccc922d7ab4c329b78a221c5308c9c68bca66122c

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks