General

  • Target

    f539c0a574b06de90e4baf4a70439329f101c1b09caea8e239af94fdc55cedce

  • Size

    462KB

  • Sample

    220128-2h9hwsffg4

  • MD5

    83237e9a1d2b8f3f79e7315138670375

  • SHA1

    88918ad1cbaa28826a0de5c1bf2a47c14cf6ccdf

  • SHA256

    f539c0a574b06de90e4baf4a70439329f101c1b09caea8e239af94fdc55cedce

  • SHA512

    cd0ec68a6e2e3643cdd7f3bd10ee69ce807137bfd4230821beca76dac50adca107e4666fb9be412cbdd15f6d1f18448a2e1e474aca6c9046329ea51d9c6818ba

Malware Config

Extracted

Family

redline

Botnet

noname

C2

185.215.113.29:20819

Targets

    • Target

      f539c0a574b06de90e4baf4a70439329f101c1b09caea8e239af94fdc55cedce

    • Size

      462KB

    • MD5

      83237e9a1d2b8f3f79e7315138670375

    • SHA1

      88918ad1cbaa28826a0de5c1bf2a47c14cf6ccdf

    • SHA256

      f539c0a574b06de90e4baf4a70439329f101c1b09caea8e239af94fdc55cedce

    • SHA512

      cd0ec68a6e2e3643cdd7f3bd10ee69ce807137bfd4230821beca76dac50adca107e4666fb9be412cbdd15f6d1f18448a2e1e474aca6c9046329ea51d9c6818ba

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Tasks