General

  • Target

    7f48e73f61d169be4bb21590c7b68e40.exe

  • Size

    397KB

  • Sample

    211219-ey8vzafha3

  • MD5

    7f48e73f61d169be4bb21590c7b68e40

  • SHA1

    97aa07c122edc7742ea14e9421e5fd5f05295874

  • SHA256

    ced624bce198d1238d037e22cb18e099f24428f592bc7596eb582a1a909915dc

  • SHA512

    8482342b364c23f174d761b74df35f1995078ae5187482b63551bce1b08cd7d56340a3efec4d1846dca7836efa7f6be85ef656cdbf9020d3ecb0b92632538d6e

Malware Config

Extracted

Family

redline

Botnet

170

C2

45.9.20.240:46257

Targets

    • Target

      7f48e73f61d169be4bb21590c7b68e40.exe

    • Size

      397KB

    • MD5

      7f48e73f61d169be4bb21590c7b68e40

    • SHA1

      97aa07c122edc7742ea14e9421e5fd5f05295874

    • SHA256

      ced624bce198d1238d037e22cb18e099f24428f592bc7596eb582a1a909915dc

    • SHA512

      8482342b364c23f174d761b74df35f1995078ae5187482b63551bce1b08cd7d56340a3efec4d1846dca7836efa7f6be85ef656cdbf9020d3ecb0b92632538d6e

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks