General

  • Target

    201a75533e813778f5278f107505b384

  • Size

    279KB

  • Sample

    220126-ylek5shfcq

  • MD5

    201a75533e813778f5278f107505b384

  • SHA1

    8523f543412b6f628011b748543f9de462229185

  • SHA256

    0ebf44ed5f0614c08d4e5f25fb08cd33fa5ec7baa6a5c9c4c19d41dbf3e9df08

  • SHA512

    f141453a0c6ca377a32dd764f74e2b2d66ac0db8f839636975b6e16cbb2c4305793a457adb296c7bbc93d6468bf3f0996b648618c7b2aa424a1df6f66f9cd2e9

Malware Config

Extracted

Family

redline

Botnet

Mastif

C2

81.91.178.186:19410

Targets

    • Target

      201a75533e813778f5278f107505b384

    • Size

      279KB

    • MD5

      201a75533e813778f5278f107505b384

    • SHA1

      8523f543412b6f628011b748543f9de462229185

    • SHA256

      0ebf44ed5f0614c08d4e5f25fb08cd33fa5ec7baa6a5c9c4c19d41dbf3e9df08

    • SHA512

      f141453a0c6ca377a32dd764f74e2b2d66ac0db8f839636975b6e16cbb2c4305793a457adb296c7bbc93d6468bf3f0996b648618c7b2aa424a1df6f66f9cd2e9

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks