General

  • Target

    256532e1ad562ef00af780bec27ccb4009017795ffd46dc8a230339850605818

  • Size

    502KB

  • Sample

    220128-vsvddshabr

  • MD5

    9d69084c817ab7f08182a9bdb43cd501

  • SHA1

    fe40416fc90c7d6a534940a92f08b43823642360

  • SHA256

    256532e1ad562ef00af780bec27ccb4009017795ffd46dc8a230339850605818

  • SHA512

    298a9aa3ac9cfa300d61c778714ef038599444a48f5f16c8afc4e570a187f3cfa5ac958614f3e8201e2089849f4f1879f6110d37d54926487e7639e853329f3e

Malware Config

Extracted

Family

redline

Botnet

RuZ1WW2801

C2

185.189.167.231:55162

Targets

    • Target

      256532e1ad562ef00af780bec27ccb4009017795ffd46dc8a230339850605818

    • Size

      502KB

    • MD5

      9d69084c817ab7f08182a9bdb43cd501

    • SHA1

      fe40416fc90c7d6a534940a92f08b43823642360

    • SHA256

      256532e1ad562ef00af780bec27ccb4009017795ffd46dc8a230339850605818

    • SHA512

      298a9aa3ac9cfa300d61c778714ef038599444a48f5f16c8afc4e570a187f3cfa5ac958614f3e8201e2089849f4f1879f6110d37d54926487e7639e853329f3e

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

3
T1005

Tasks