General

  • Target

    e4e2de1f2cb31a67b7e0209d8144d2a8e72a5ae6182dafdd32aaca99a73d45ec

  • Size

    428KB

  • Sample

    220115-b4f6cscbgm

  • MD5

    c50fd05c48e995824aa91c979d071f62

  • SHA1

    f1ce385732e54ed8e8951093548b0c831fcab34d

  • SHA256

    e4e2de1f2cb31a67b7e0209d8144d2a8e72a5ae6182dafdd32aaca99a73d45ec

  • SHA512

    738275bcbdd56e0c1a82b50a7c064b72ea703609420e02523e25632f7953464d16f40e1397b54b19e2c69d7b82640fe1270a30bea0d59b8652c072abfa60be4a

Malware Config

Extracted

Family

redline

Botnet

RUZKI

C2

185.215.113.29:34865

Targets

    • Target

      e4e2de1f2cb31a67b7e0209d8144d2a8e72a5ae6182dafdd32aaca99a73d45ec

    • Size

      428KB

    • MD5

      c50fd05c48e995824aa91c979d071f62

    • SHA1

      f1ce385732e54ed8e8951093548b0c831fcab34d

    • SHA256

      e4e2de1f2cb31a67b7e0209d8144d2a8e72a5ae6182dafdd32aaca99a73d45ec

    • SHA512

      738275bcbdd56e0c1a82b50a7c064b72ea703609420e02523e25632f7953464d16f40e1397b54b19e2c69d7b82640fe1270a30bea0d59b8652c072abfa60be4a

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Tasks