General

  • Target

    178ac4d5c2c3bb76cc353b99fe328436c9a5cba42b9ee6b1693f5ed24708e4dd

  • Size

    383KB

  • Sample

    220116-zdcx1sgdar

  • MD5

    db1806f6122a311603f9d949b9a14603

  • SHA1

    dbe091a9c5cc04566f55222ed9043e9fec517544

  • SHA256

    178ac4d5c2c3bb76cc353b99fe328436c9a5cba42b9ee6b1693f5ed24708e4dd

  • SHA512

    22ffc3c2f890724906355a4eb3ee2c84a9e24f1c18f073e1fe98c2332d707bab3e4a9249c8e14a69f97379ae99fac397cdeaea4d013f8ec77f325a012d90f466

Malware Config

Extracted

Family

redline

Botnet

noname

C2

185.215.113.29:34865

Targets

    • Target

      178ac4d5c2c3bb76cc353b99fe328436c9a5cba42b9ee6b1693f5ed24708e4dd

    • Size

      383KB

    • MD5

      db1806f6122a311603f9d949b9a14603

    • SHA1

      dbe091a9c5cc04566f55222ed9043e9fec517544

    • SHA256

      178ac4d5c2c3bb76cc353b99fe328436c9a5cba42b9ee6b1693f5ed24708e4dd

    • SHA512

      22ffc3c2f890724906355a4eb3ee2c84a9e24f1c18f073e1fe98c2332d707bab3e4a9249c8e14a69f97379ae99fac397cdeaea4d013f8ec77f325a012d90f466

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Tasks