General

  • Target

    4cebae64e0fb876ce9ac5c0bfc7c0bb8.exe

  • Size

    409KB

  • Sample

    220119-pabknshehp

  • MD5

    4cebae64e0fb876ce9ac5c0bfc7c0bb8

  • SHA1

    1c02db2ea5cec5ec367754713f3a50610607f59f

  • SHA256

    854fafb9118a481083c420e6701ecee2b438700c267a3debfa7d75afb44eab8d

  • SHA512

    ae7e8a189a344d8f2e9e706a4056fb604cb6585fd30855a9df36e61016222c6aad6ad4cd624f00e9261c286fef173833306e70e8bd8b7b9ee67101fa88add309

Malware Config

Extracted

Family

redline

Botnet

Pablicher

C2

185.215.113.10:39759

Targets

    • Target

      4cebae64e0fb876ce9ac5c0bfc7c0bb8.exe

    • Size

      409KB

    • MD5

      4cebae64e0fb876ce9ac5c0bfc7c0bb8

    • SHA1

      1c02db2ea5cec5ec367754713f3a50610607f59f

    • SHA256

      854fafb9118a481083c420e6701ecee2b438700c267a3debfa7d75afb44eab8d

    • SHA512

      ae7e8a189a344d8f2e9e706a4056fb604cb6585fd30855a9df36e61016222c6aad6ad4cd624f00e9261c286fef173833306e70e8bd8b7b9ee67101fa88add309

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.