General

  • Target

    f713fd7d8d6e0fb913772408d10d86ed83e1e66fe6a453210d347e3cabe90289

  • Size

    433KB

  • Sample

    220118-gmx1fahfg5

  • MD5

    a7cdb41650af298b37dd666b4d8a8ccb

  • SHA1

    21aa67085146e72f2069dac8d3b23a493d5c105a

  • SHA256

    f713fd7d8d6e0fb913772408d10d86ed83e1e66fe6a453210d347e3cabe90289

  • SHA512

    ead187c1bef9b6f9da118fda5002a9da363182e5dfc368cdadedd01fc483b4da7ce1840ad5b48f3c25cc67ab01fe37c05ded4e24292bb9ecc603f35d2cda6704

Malware Config

Extracted

Family

redline

Botnet

noname

C2

185.215.113.29:34865

Targets

    • Target

      f713fd7d8d6e0fb913772408d10d86ed83e1e66fe6a453210d347e3cabe90289

    • Size

      433KB

    • MD5

      a7cdb41650af298b37dd666b4d8a8ccb

    • SHA1

      21aa67085146e72f2069dac8d3b23a493d5c105a

    • SHA256

      f713fd7d8d6e0fb913772408d10d86ed83e1e66fe6a453210d347e3cabe90289

    • SHA512

      ead187c1bef9b6f9da118fda5002a9da363182e5dfc368cdadedd01fc483b4da7ce1840ad5b48f3c25cc67ab01fe37c05ded4e24292bb9ecc603f35d2cda6704

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks