General

  • Target

    107de93f9efca6da5471d8c563c7be23051368d40b57d42163a2adb0a818fa5a

  • Size

    541KB

  • Sample

    211201-na66xabfbp

  • MD5

    75890e4d68ad26383787dce03592691c

  • SHA1

    0f16b2f8b33d4e02597ed4e9e3cb847fa69ab5b6

  • SHA256

    107de93f9efca6da5471d8c563c7be23051368d40b57d42163a2adb0a818fa5a

  • SHA512

    99c9054dfcf9e13053139ad296979e292c0c30920c1dab248c6d9f41fa69a7bed46578d233b5ee3d70d11722cf8692629574da2a47618b1086b1dc54c973a5a6

Malware Config

Extracted

Family

redline

Botnet

star

C2

37.9.13.169:63912

Targets

    • Target

      107de93f9efca6da5471d8c563c7be23051368d40b57d42163a2adb0a818fa5a

    • Size

      541KB

    • MD5

      75890e4d68ad26383787dce03592691c

    • SHA1

      0f16b2f8b33d4e02597ed4e9e3cb847fa69ab5b6

    • SHA256

      107de93f9efca6da5471d8c563c7be23051368d40b57d42163a2adb0a818fa5a

    • SHA512

      99c9054dfcf9e13053139ad296979e292c0c30920c1dab248c6d9f41fa69a7bed46578d233b5ee3d70d11722cf8692629574da2a47618b1086b1dc54c973a5a6

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Downloads MZ/PE file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks