General

  • Target

    8423dd9eb85cb0023cd4b8a127b57b4d555f339eba21fd24508e53c91c11d431

  • Size

    462KB

  • Sample

    220128-2phczsfha9

  • MD5

    1a486a704fb8f22491cf93351212b9bd

  • SHA1

    27b105c9b480197d29e109f661a4b1643be0d453

  • SHA256

    8423dd9eb85cb0023cd4b8a127b57b4d555f339eba21fd24508e53c91c11d431

  • SHA512

    3194797d1c76203a488b99519956a2cb91bae3bcb4499cf634ba7e3481b5e9555314d79089eed0339af631f229168eb56ad1159219420161828b2b26415d45f5

Malware Config

Extracted

Family

redline

Botnet

ruzkiKAKOYTO

C2

185.215.113.29:20819

Targets

    • Target

      8423dd9eb85cb0023cd4b8a127b57b4d555f339eba21fd24508e53c91c11d431

    • Size

      462KB

    • MD5

      1a486a704fb8f22491cf93351212b9bd

    • SHA1

      27b105c9b480197d29e109f661a4b1643be0d453

    • SHA256

      8423dd9eb85cb0023cd4b8a127b57b4d555f339eba21fd24508e53c91c11d431

    • SHA512

      3194797d1c76203a488b99519956a2cb91bae3bcb4499cf634ba7e3481b5e9555314d79089eed0339af631f229168eb56ad1159219420161828b2b26415d45f5

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Tasks