General

  • Target

    4d7bd96b204500063e43549b035f1344c9d2173758d026235f7bc2afdbcd0451

  • Size

    444KB

  • Sample

    220126-q6lk7adgh4

  • MD5

    f1dc877c8ed53d6b4623065ae2ecf16e

  • SHA1

    9c1a7bdecb571ed8e883f84af5f4991b5d6472f5

  • SHA256

    4d7bd96b204500063e43549b035f1344c9d2173758d026235f7bc2afdbcd0451

  • SHA512

    90e76ad5e9a5cf0022a8c7cb0ffbc51aefadc689e527f1ad8321a4ef75f559b1579873bc9b3bf2ab4530caa5aac64ba6fdeb86da6d604d10a900f531807e1f63

Malware Config

Extracted

Family

redline

Botnet

ruzkiKAKOYTO

C2

185.215.113.29:20819

Targets

    • Target

      4d7bd96b204500063e43549b035f1344c9d2173758d026235f7bc2afdbcd0451

    • Size

      444KB

    • MD5

      f1dc877c8ed53d6b4623065ae2ecf16e

    • SHA1

      9c1a7bdecb571ed8e883f84af5f4991b5d6472f5

    • SHA256

      4d7bd96b204500063e43549b035f1344c9d2173758d026235f7bc2afdbcd0451

    • SHA512

      90e76ad5e9a5cf0022a8c7cb0ffbc51aefadc689e527f1ad8321a4ef75f559b1579873bc9b3bf2ab4530caa5aac64ba6fdeb86da6d604d10a900f531807e1f63

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Tasks