General

  • Target

    6c251106b903b525e3ffa3d0ac5fd47704a0970841f4a.exe

  • Size

    552KB

  • Sample

    211128-fretzsgadl

  • MD5

    c986e3f232dd71ac91e33cbbddf25c0a

  • SHA1

    c0d65b2188e25c1e62de1d8bd5c4dc67f49ef248

  • SHA256

    6c251106b903b525e3ffa3d0ac5fd47704a0970841f4a493d15fb374ee35f0e9

  • SHA512

    e36e7e15e6e8c266e168e9570f8d08082ca8dd2d85cb6edbf5eb61ca63dacfe1db92eed9724346d3c39effa51d14dc65a23c767a4a184447032a19241482dd21

Malware Config

Extracted

Family

redline

Botnet

Robot

C2

178.238.8.47:36439

Extracted

Family

redline

Botnet

456390

C2

45.77.80.187:15300

Targets

    • Target

      6c251106b903b525e3ffa3d0ac5fd47704a0970841f4a.exe

    • Size

      552KB

    • MD5

      c986e3f232dd71ac91e33cbbddf25c0a

    • SHA1

      c0d65b2188e25c1e62de1d8bd5c4dc67f49ef248

    • SHA256

      6c251106b903b525e3ffa3d0ac5fd47704a0970841f4a493d15fb374ee35f0e9

    • SHA512

      e36e7e15e6e8c266e168e9570f8d08082ca8dd2d85cb6edbf5eb61ca63dacfe1db92eed9724346d3c39effa51d14dc65a23c767a4a184447032a19241482dd21

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Tasks