General

  • Target

    0aed0fbfc4f64b71a85fbc5207b5f3d8.exe

  • Size

    443KB

  • Sample

    220126-kpv6eabagj

  • MD5

    0aed0fbfc4f64b71a85fbc5207b5f3d8

  • SHA1

    b2e0212e4ccc98069a9f2266c2a2881c32dc32a7

  • SHA256

    4f214ddbc3c9d5882eefd5eda0d3dcd87290f5f95f42cfdc6c0e8a0fcf6199af

  • SHA512

    f278b9d66c87bc1ce93651693e353e3a82417dc3681cc908bc5a25952b339bde5d8de2293de42e4ac812cd1d257f854f1d88b058d79bf1f511c567e88f1efa38

Malware Config

Extracted

Family

redline

Botnet

ruzkiKAKOYTO

C2

185.215.113.29:20819

Targets

    • Target

      0aed0fbfc4f64b71a85fbc5207b5f3d8.exe

    • Size

      443KB

    • MD5

      0aed0fbfc4f64b71a85fbc5207b5f3d8

    • SHA1

      b2e0212e4ccc98069a9f2266c2a2881c32dc32a7

    • SHA256

      4f214ddbc3c9d5882eefd5eda0d3dcd87290f5f95f42cfdc6c0e8a0fcf6199af

    • SHA512

      f278b9d66c87bc1ce93651693e353e3a82417dc3681cc908bc5a25952b339bde5d8de2293de42e4ac812cd1d257f854f1d88b058d79bf1f511c567e88f1efa38

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Tasks