General

  • Target

    767c0b20012bf23cde25ae906aaaea5c88f2ae624959e08a86fb0c8bab38b5c8

  • Size

    384KB

  • Sample

    220116-1wn9fagdhm

  • MD5

    85e9f2149dcb8ea6d7aba7fada70733e

  • SHA1

    7885acc080841e5755436ac694ded3cc966dcbe1

  • SHA256

    767c0b20012bf23cde25ae906aaaea5c88f2ae624959e08a86fb0c8bab38b5c8

  • SHA512

    a52b7d28c714f8d7773daf3a8ae5db733f48a1ca2001afde7e793b9a8068ecd2fa2b4e412d477037955785713ed12e844f3f40eecc8188709f69161615530840

Malware Config

Extracted

Family

redline

Botnet

noname

C2

185.215.113.29:34865

Targets

    • Target

      767c0b20012bf23cde25ae906aaaea5c88f2ae624959e08a86fb0c8bab38b5c8

    • Size

      384KB

    • MD5

      85e9f2149dcb8ea6d7aba7fada70733e

    • SHA1

      7885acc080841e5755436ac694ded3cc966dcbe1

    • SHA256

      767c0b20012bf23cde25ae906aaaea5c88f2ae624959e08a86fb0c8bab38b5c8

    • SHA512

      a52b7d28c714f8d7773daf3a8ae5db733f48a1ca2001afde7e793b9a8068ecd2fa2b4e412d477037955785713ed12e844f3f40eecc8188709f69161615530840

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks