General

  • Target

    249cc8402795cf72262d669d0f66eaa7a061a853bee3c10cc31bc806e369b768

  • Size

    466KB

  • Sample

    220126-1yn2fsbaeq

  • MD5

    e3850e1f5b1d2b8a6976fbbeb8997704

  • SHA1

    46735c3ccd1ac56a0766b2f6ebc7613238d83fac

  • SHA256

    249cc8402795cf72262d669d0f66eaa7a061a853bee3c10cc31bc806e369b768

  • SHA512

    b3f9944383ea5e62d852fbc51767d79610601a92805693329c4fbdafef408dedb4b0db119d9a6b5d90c526ffc6c1d3bace8b63b6966a58ca27d3a41c19af4d84

Malware Config

Extracted

Family

redline

Botnet

ruzkiKAKOYTO

C2

185.215.113.29:20819

Targets

    • Target

      249cc8402795cf72262d669d0f66eaa7a061a853bee3c10cc31bc806e369b768

    • Size

      466KB

    • MD5

      e3850e1f5b1d2b8a6976fbbeb8997704

    • SHA1

      46735c3ccd1ac56a0766b2f6ebc7613238d83fac

    • SHA256

      249cc8402795cf72262d669d0f66eaa7a061a853bee3c10cc31bc806e369b768

    • SHA512

      b3f9944383ea5e62d852fbc51767d79610601a92805693329c4fbdafef408dedb4b0db119d9a6b5d90c526ffc6c1d3bace8b63b6966a58ca27d3a41c19af4d84

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks