General

  • Target

    26a134a9ae3f32dfb36e1487adeabc15.exe

  • Size

    444KB

  • Sample

    220126-tj34haehhj

  • MD5

    26a134a9ae3f32dfb36e1487adeabc15

  • SHA1

    f27ea7f689132c3bb34a1f41b644d93181d0561a

  • SHA256

    91be0ef6635c6d2430f006acbc090d03338d2eafe921c1cf72fbc8c077cb885b

  • SHA512

    e7419a3b4e4708e6af558c094da2814766c329c2f7d0b9cb1bbf03cba53340088cbc9e81b205798d1576fa9c97e6f72ecf5b94c02b12f7905c81b34094fc43a1

Malware Config

Extracted

Family

redline

Botnet

ruzkiKAKOYTO

C2

185.215.113.29:20819

Targets

    • Target

      26a134a9ae3f32dfb36e1487adeabc15.exe

    • Size

      444KB

    • MD5

      26a134a9ae3f32dfb36e1487adeabc15

    • SHA1

      f27ea7f689132c3bb34a1f41b644d93181d0561a

    • SHA256

      91be0ef6635c6d2430f006acbc090d03338d2eafe921c1cf72fbc8c077cb885b

    • SHA512

      e7419a3b4e4708e6af558c094da2814766c329c2f7d0b9cb1bbf03cba53340088cbc9e81b205798d1576fa9c97e6f72ecf5b94c02b12f7905c81b34094fc43a1

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Tasks