General

  • Target

    622fee9644b49b754c5a1edecfae2adde03c3c9017de407e12c26d89519ae8cb

  • Size

    437KB

  • Sample

    220117-wcyasabhhl

  • MD5

    14437e3e01fce27e45d5049f082ee55d

  • SHA1

    fcb793527e4a4e0acad2c0e868334f98dff1a377

  • SHA256

    622fee9644b49b754c5a1edecfae2adde03c3c9017de407e12c26d89519ae8cb

  • SHA512

    ad5dbf3d80e03a92dfc64cfeedcdff182977f25355b532ba732ffdfcc15364bf71ffc31b3dd9dfec44e9909bff465e822d539e882010a6d1ca8b9d1551b9a979

Malware Config

Extracted

Family

redline

Botnet

noname

C2

185.215.113.29:34865

Targets

    • Target

      622fee9644b49b754c5a1edecfae2adde03c3c9017de407e12c26d89519ae8cb

    • Size

      437KB

    • MD5

      14437e3e01fce27e45d5049f082ee55d

    • SHA1

      fcb793527e4a4e0acad2c0e868334f98dff1a377

    • SHA256

      622fee9644b49b754c5a1edecfae2adde03c3c9017de407e12c26d89519ae8cb

    • SHA512

      ad5dbf3d80e03a92dfc64cfeedcdff182977f25355b532ba732ffdfcc15364bf71ffc31b3dd9dfec44e9909bff465e822d539e882010a6d1ca8b9d1551b9a979

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks