General

  • Target

    03c9d092f03b568db03ae4d1f214724f2041b6281957c1404156f02a43c5ad23

  • Size

    702KB

  • Sample

    220126-vl25nagbc5

  • MD5

    435757d3c3e80723c18c9053dbe3bb90

  • SHA1

    8f38de1a3bf7a3937b712db14f11e8a6d1a3ec00

  • SHA256

    03c9d092f03b568db03ae4d1f214724f2041b6281957c1404156f02a43c5ad23

  • SHA512

    88387e0182d1969f2957e8814383624052d03460d7ef7770c4835504bdc9cb77992dd3c1e620cdb9a9f0e74abeba7e8e86ccb405757e6e6f279705b4be5fa99d

Malware Config

Extracted

Family

redline

Botnet

mix26.01

C2

185.215.113.70:21508

Targets

    • Target

      03c9d092f03b568db03ae4d1f214724f2041b6281957c1404156f02a43c5ad23

    • Size

      702KB

    • MD5

      435757d3c3e80723c18c9053dbe3bb90

    • SHA1

      8f38de1a3bf7a3937b712db14f11e8a6d1a3ec00

    • SHA256

      03c9d092f03b568db03ae4d1f214724f2041b6281957c1404156f02a43c5ad23

    • SHA512

      88387e0182d1969f2957e8814383624052d03460d7ef7770c4835504bdc9cb77992dd3c1e620cdb9a9f0e74abeba7e8e86ccb405757e6e6f279705b4be5fa99d

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Command and Control

Web Service

1
T1102

Tasks