General

  • Target

    6d7542d598cd306c5a7898c61bda76ab782e65c6db8d07f555c032011d7b4d01

  • Size

    269KB

  • Sample

    211126-zrg4wsehcp

  • MD5

    643cc7f150f402b8954e2ba7da05ef5c

  • SHA1

    f49d19956317a86b99beb3dc041a1bdd1b4bd997

  • SHA256

    6d7542d598cd306c5a7898c61bda76ab782e65c6db8d07f555c032011d7b4d01

  • SHA512

    cee1ae38e865eb18e7b4fe5c1dba7fce2cbe87030fa40e59d4aaf78535faa2af1ac1b4dcdcfc7f25dfe52e1695ea98e0c728d0825db2eb6cf3513bb5731e7985

Malware Config

Extracted

Family

redline

Botnet

Pubdate

C2

193.56.146.64:65441

Targets

    • Target

      6d7542d598cd306c5a7898c61bda76ab782e65c6db8d07f555c032011d7b4d01

    • Size

      269KB

    • MD5

      643cc7f150f402b8954e2ba7da05ef5c

    • SHA1

      f49d19956317a86b99beb3dc041a1bdd1b4bd997

    • SHA256

      6d7542d598cd306c5a7898c61bda76ab782e65c6db8d07f555c032011d7b4d01

    • SHA512

      cee1ae38e865eb18e7b4fe5c1dba7fce2cbe87030fa40e59d4aaf78535faa2af1ac1b4dcdcfc7f25dfe52e1695ea98e0c728d0825db2eb6cf3513bb5731e7985

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks