General

  • Target

    604d067bb1ba24d8723f2931e367d2805e1cb5afbb7a5b124ba2c8481cd9951d

  • Size

    466KB

  • Sample

    220128-h7z6zahael

  • MD5

    104c97c6a552997d67ad5201ad288d21

  • SHA1

    bd41ed12ed60428458aa719486e5b45d306b9934

  • SHA256

    604d067bb1ba24d8723f2931e367d2805e1cb5afbb7a5b124ba2c8481cd9951d

  • SHA512

    4e4f0ceec71c244448172286f63f3c6a26a4e07aa7d5eeebff568abac61eb2976b24833fdeb01261abac47636eed7e1be43d7736474b7851e4ca6899765d25a6

Malware Config

Extracted

Family

redline

Botnet

noname

C2

185.215.113.29:20819

Targets

    • Target

      604d067bb1ba24d8723f2931e367d2805e1cb5afbb7a5b124ba2c8481cd9951d

    • Size

      466KB

    • MD5

      104c97c6a552997d67ad5201ad288d21

    • SHA1

      bd41ed12ed60428458aa719486e5b45d306b9934

    • SHA256

      604d067bb1ba24d8723f2931e367d2805e1cb5afbb7a5b124ba2c8481cd9951d

    • SHA512

      4e4f0ceec71c244448172286f63f3c6a26a4e07aa7d5eeebff568abac61eb2976b24833fdeb01261abac47636eed7e1be43d7736474b7851e4ca6899765d25a6

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Tasks