General

  • Target

    58029b60514f832ec0c142a113a9e2904adac828c7a68d776a0a753ef315604e

  • Size

    391KB

  • Sample

    220124-aw6wdaggcr

  • MD5

    075cadeee17813b4d554a02899c1d81e

  • SHA1

    2a688a4729097a98bc42ddba0e1cc6cc56a0237e

  • SHA256

    58029b60514f832ec0c142a113a9e2904adac828c7a68d776a0a753ef315604e

  • SHA512

    9fc836749ca6c0c0393bfa7f0a894fa0aa8f4b3d296f8792ccb6a9800c472e897526ba78cf332b3518e63d460d9438c0959dfc5976780682f04b78199c1b2c52

Malware Config

Extracted

Family

redline

Botnet

NONAME

C2

45.9.20.111:1355

Targets

    • Target

      58029b60514f832ec0c142a113a9e2904adac828c7a68d776a0a753ef315604e

    • Size

      391KB

    • MD5

      075cadeee17813b4d554a02899c1d81e

    • SHA1

      2a688a4729097a98bc42ddba0e1cc6cc56a0237e

    • SHA256

      58029b60514f832ec0c142a113a9e2904adac828c7a68d776a0a753ef315604e

    • SHA512

      9fc836749ca6c0c0393bfa7f0a894fa0aa8f4b3d296f8792ccb6a9800c472e897526ba78cf332b3518e63d460d9438c0959dfc5976780682f04b78199c1b2c52

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Tasks