General

  • Target

    cd9390a91cc2599beac9eb74b44d2dde936fa2a80ed8302e32c6b5249f6b07ab

  • Size

    408KB

  • Sample

    220119-l91r3ahaak

  • MD5

    5919e604e52c1111af34ab053bb340ab

  • SHA1

    3fc82649b3805215ac89618c55978be81d0477d6

  • SHA256

    cd9390a91cc2599beac9eb74b44d2dde936fa2a80ed8302e32c6b5249f6b07ab

  • SHA512

    0e4c4440d6cb4c939b9afacb647eaed46cc200dce5ec2ad95c671aa07e8ebfc38287cc351b4cdb492b33a59f0a8e60d784fa08b350663fffe3f2516e689de0a4

Malware Config

Extracted

Family

redline

Botnet

noname

C2

185.215.113.29:34865

Targets

    • Target

      cd9390a91cc2599beac9eb74b44d2dde936fa2a80ed8302e32c6b5249f6b07ab

    • Size

      408KB

    • MD5

      5919e604e52c1111af34ab053bb340ab

    • SHA1

      3fc82649b3805215ac89618c55978be81d0477d6

    • SHA256

      cd9390a91cc2599beac9eb74b44d2dde936fa2a80ed8302e32c6b5249f6b07ab

    • SHA512

      0e4c4440d6cb4c939b9afacb647eaed46cc200dce5ec2ad95c671aa07e8ebfc38287cc351b4cdb492b33a59f0a8e60d784fa08b350663fffe3f2516e689de0a4

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks