0b1ba1152d880ea499e8060a5c42fd27b0b3271a26fe70c236f924be0e7a1394

General
Target

0b1ba1152d880ea499e8060a5c42fd27b0b3271a26fe70c236f924be0e7a1394

Size

329KB

Sample

220127-zt42fabac8

Score
10 /10
MD5

61ae33f0277ac7c40dfce4c64a7a785d

SHA1

dc2208bdbb09115aad4a666ebc21dfa97a8b24b8

SHA256

0b1ba1152d880ea499e8060a5c42fd27b0b3271a26fe70c236f924be0e7a1394

SHA512

78ac439830356d02cfcfd5595a094170e47df61e1490f6274ded5f7b06c0a3f169d6d3a2af45f9f0bfc794efd4a18c67f3dc708d165c3c9a1ad1849549f0fe0d

Malware Config

Extracted

Family redline
Botnet noname
C2

185.215.113.29:20819

Targets
Target

0b1ba1152d880ea499e8060a5c42fd27b0b3271a26fe70c236f924be0e7a1394

MD5

61ae33f0277ac7c40dfce4c64a7a785d

Filesize

329KB

Score
10/10
SHA1

dc2208bdbb09115aad4a666ebc21dfa97a8b24b8

SHA256

0b1ba1152d880ea499e8060a5c42fd27b0b3271a26fe70c236f924be0e7a1394

SHA512

78ac439830356d02cfcfd5595a094170e47df61e1490f6274ded5f7b06c0a3f169d6d3a2af45f9f0bfc794efd4a18c67f3dc708d165c3c9a1ad1849549f0fe0d

Tags

Signatures

  • RedLine

    Description

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    Tags

  • RedLine Payload

  • Reads user/profile data of web browsers

    Description

    Infostealers often target stored browser data, which can include saved credentials etc.

    Tags

    TTPs

    Data from Local SystemCredentials in Files
  • Checks installed software on the system

    Description

    Looks up Uninstall key entries in the registry to enumerate software on the system.

    Tags

    TTPs

    Query Registry

Related Tasks

MITRE ATT&CK Matrix
Command and Control
    Credential Access
    Defense Evasion
      Discovery
      Execution
        Exfiltration
          Impact
            Initial Access
              Lateral Movement
                Persistence
                  Privilege Escalation
                    Tasks