General

  • Target

    213d9e929c848f61d65575464774acfdd2a03a1c7f1f36721b8e17e658fcabf6

  • Size

    426KB

  • Sample

    220113-yypxmscdbq

  • MD5

    030caa5be424184878386e71494c39c2

  • SHA1

    ca7eb8c0209c8b4604cef821123bb1453b62c33e

  • SHA256

    213d9e929c848f61d65575464774acfdd2a03a1c7f1f36721b8e17e658fcabf6

  • SHA512

    e4e3d316413a48bad1decb6777634fd5680fe53d0fc694201ec93f0493b0a8b585f3cdd9c5f80bc735b10905a0bc3599626984f6d2714eadf9eada2ec7d780e5

Malware Config

Extracted

Family

redline

Botnet

noname

C2

185.215.113.29:34865

Targets

    • Target

      213d9e929c848f61d65575464774acfdd2a03a1c7f1f36721b8e17e658fcabf6

    • Size

      426KB

    • MD5

      030caa5be424184878386e71494c39c2

    • SHA1

      ca7eb8c0209c8b4604cef821123bb1453b62c33e

    • SHA256

      213d9e929c848f61d65575464774acfdd2a03a1c7f1f36721b8e17e658fcabf6

    • SHA512

      e4e3d316413a48bad1decb6777634fd5680fe53d0fc694201ec93f0493b0a8b585f3cdd9c5f80bc735b10905a0bc3599626984f6d2714eadf9eada2ec7d780e5

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks