General

  • Target

    b2447e963d6977df20c14f11cfd2689313588245a3b6d5b22959faa9fedd9f05

  • Size

    462KB

  • Sample

    220128-mky3lsbgh6

  • MD5

    f1863173e6e7c37ff382a69bec002c6d

  • SHA1

    fc81497cf7651a44fff12619f5aadf86402bffb9

  • SHA256

    b2447e963d6977df20c14f11cfd2689313588245a3b6d5b22959faa9fedd9f05

  • SHA512

    550ff073dbe2c907f4852f6a49a6cd74cf6ed0e5979009e05ddadb9a3e46048d6bef9c8480b053a23387370150433500ad96164521efb3022d58d8dcdc174649

Malware Config

Extracted

Family

redline

Botnet

ruzkiKAKOYTO

C2

185.215.113.29:20819

Targets

    • Target

      b2447e963d6977df20c14f11cfd2689313588245a3b6d5b22959faa9fedd9f05

    • Size

      462KB

    • MD5

      f1863173e6e7c37ff382a69bec002c6d

    • SHA1

      fc81497cf7651a44fff12619f5aadf86402bffb9

    • SHA256

      b2447e963d6977df20c14f11cfd2689313588245a3b6d5b22959faa9fedd9f05

    • SHA512

      550ff073dbe2c907f4852f6a49a6cd74cf6ed0e5979009e05ddadb9a3e46048d6bef9c8480b053a23387370150433500ad96164521efb3022d58d8dcdc174649

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Tasks