General

  • Target

    batl3.exe

  • Size

    554KB

  • Sample

    211207-p5dcracbd5

  • MD5

    d934479322934bdf30de5436e4d3e2d5

  • SHA1

    64c0d9bff5f908218376c5839b9b3c2780354a1a

  • SHA256

    ba195e3c25825c94b18e12def03ce866259f39761a5c01373c4eedd284a867ad

  • SHA512

    da81ebe53ba1b3d2f94bcedd1adaa71fc8da3ea10eeeafd2c1a88a3b5e8b10392907e04138112b2a16edb0fbb58b5685279acc0651a17307ed2f7b16b6fe4605

Malware Config

Extracted

Family

redline

Botnet

1.12.2021

C2

95.217.213.248:42382

Targets

    • Target

      batl3.exe

    • Size

      554KB

    • MD5

      d934479322934bdf30de5436e4d3e2d5

    • SHA1

      64c0d9bff5f908218376c5839b9b3c2780354a1a

    • SHA256

      ba195e3c25825c94b18e12def03ce866259f39761a5c01373c4eedd284a867ad

    • SHA512

      da81ebe53ba1b3d2f94bcedd1adaa71fc8da3ea10eeeafd2c1a88a3b5e8b10392907e04138112b2a16edb0fbb58b5685279acc0651a17307ed2f7b16b6fe4605

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks