General

  • Target

    a9f12ee9f7837846d472da6d0c1a367e.exe

  • Size

    397KB

  • Sample

    211219-epmw5sfgg9

  • MD5

    a9f12ee9f7837846d472da6d0c1a367e

  • SHA1

    628ed88c92cf1edcfec8cdc3c402ea0a275007c7

  • SHA256

    d303f85fce835fcfe378620cdfa762d4855e991acd57946e1d6c547ed33fdd81

  • SHA512

    a28dfae89cd5964d8759fafc6014ce1a110a8e4407a918d0a197091575d9aba803bc18014012a5ea876ce3e92f3d6af455c649d2950dc3ee35176d4ba93a321f

Malware Config

Extracted

Family

redline

Botnet

170

C2

45.9.20.240:46257

Targets

    • Target

      a9f12ee9f7837846d472da6d0c1a367e.exe

    • Size

      397KB

    • MD5

      a9f12ee9f7837846d472da6d0c1a367e

    • SHA1

      628ed88c92cf1edcfec8cdc3c402ea0a275007c7

    • SHA256

      d303f85fce835fcfe378620cdfa762d4855e991acd57946e1d6c547ed33fdd81

    • SHA512

      a28dfae89cd5964d8759fafc6014ce1a110a8e4407a918d0a197091575d9aba803bc18014012a5ea876ce3e92f3d6af455c649d2950dc3ee35176d4ba93a321f

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks