General

  • Target

    10ba9f3408d71b5a0a7d7ce561438ada14977985d5331c80f1e7fd98629e7c77

  • Size

    438KB

  • Sample

    220117-yrt8sacfbl

  • MD5

    0aaba5acce13f4378f20145c4a5fd150

  • SHA1

    e5c0a7cea2ac90d07d496230ad5249a329319c96

  • SHA256

    10ba9f3408d71b5a0a7d7ce561438ada14977985d5331c80f1e7fd98629e7c77

  • SHA512

    c47a02c14876e53c7f5ded6b57711a04b57863e3b8b6012a965f32a14086e886e4fd302e67dc482d6a02bc4f1a9511fe5c91f072d56cf8a97969c620008532c9

Malware Config

Extracted

Family

redline

Botnet

noname

C2

185.215.113.29:34865

Targets

    • Target

      10ba9f3408d71b5a0a7d7ce561438ada14977985d5331c80f1e7fd98629e7c77

    • Size

      438KB

    • MD5

      0aaba5acce13f4378f20145c4a5fd150

    • SHA1

      e5c0a7cea2ac90d07d496230ad5249a329319c96

    • SHA256

      10ba9f3408d71b5a0a7d7ce561438ada14977985d5331c80f1e7fd98629e7c77

    • SHA512

      c47a02c14876e53c7f5ded6b57711a04b57863e3b8b6012a965f32a14086e886e4fd302e67dc482d6a02bc4f1a9511fe5c91f072d56cf8a97969c620008532c9

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks