067b704b54f19baef687e3e3f4ac845283b1f670752df309e6eb143565851da6

General
Target

067b704b54f19baef687e3e3f4ac845283b1f670752df309e6eb143565851da6

Size

1MB

Sample

220127-k6hxeaaeh5

Score
10 /10
MD5

ba48cbe3330971221c4c9c406a30ef6f

SHA1

d766e0b0a7108d201490b256d5164c087ee13715

SHA256

067b704b54f19baef687e3e3f4ac845283b1f670752df309e6eb143565851da6

SHA512

650e1e0d9bcb1f6f1b123b1782e16fb2a03c8cb034e23b9ff4875572978fa36b3573a65c983555e87ca2adb93adc9dc10e868baa77570620c03e9897ed8a678d

Malware Config

Extracted

Family redline
C2

185.105.119.120:48759

Extracted

Family redline
Botnet cheat
C2

185.253.7.41:49508

Targets
Target

067b704b54f19baef687e3e3f4ac845283b1f670752df309e6eb143565851da6

MD5

ba48cbe3330971221c4c9c406a30ef6f

Filesize

1MB

Score
10/10
SHA1

d766e0b0a7108d201490b256d5164c087ee13715

SHA256

067b704b54f19baef687e3e3f4ac845283b1f670752df309e6eb143565851da6

SHA512

650e1e0d9bcb1f6f1b123b1782e16fb2a03c8cb034e23b9ff4875572978fa36b3573a65c983555e87ca2adb93adc9dc10e868baa77570620c03e9897ed8a678d

Tags

Signatures

  • RedLine

    Description

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    Tags

  • RedLine Payload

  • Downloads MZ/PE file

  • Executes dropped EXE

  • Reads user/profile data of web browsers

    Description

    Infostealers often target stored browser data, which can include saved credentials etc.

    Tags

    TTPs

    Data from Local SystemCredentials in Files
  • Checks installed software on the system

    Description

    Looks up Uninstall key entries in the registry to enumerate software on the system.

    Tags

    TTPs

    Query Registry
  • Suspicious use of SetThreadContext

Related Tasks

MITRE ATT&CK Matrix
Command and Control
    Credential Access
    Defense Evasion
      Execution
        Exfiltration
          Impact
            Initial Access
              Lateral Movement
                Persistence
                Privilege Escalation
                  Tasks