General

  • Target

    343c657c014a2bc8ac6880ae030c17237710a8f92d7d0d41f64d06efda3e99e6

  • Size

    461KB

  • Sample

    220128-zc6hyadda2

  • MD5

    3ebfe50ba1d6a32fe2c87641478f8dab

  • SHA1

    21fc661f63f2ffff0e141ba8b78dc88c57bd647b

  • SHA256

    343c657c014a2bc8ac6880ae030c17237710a8f92d7d0d41f64d06efda3e99e6

  • SHA512

    af54cf29203c0adaedd46f42fde040085798c9b517c74c823d1f8680451c76c07cdee31e9cf3339537b19f1b2fefe3b3af1cf161e4faf703f17dfaa3e15f5b7b

Malware Config

Extracted

Family

redline

Botnet

noname

C2

185.215.113.29:20819

Targets

    • Target

      343c657c014a2bc8ac6880ae030c17237710a8f92d7d0d41f64d06efda3e99e6

    • Size

      461KB

    • MD5

      3ebfe50ba1d6a32fe2c87641478f8dab

    • SHA1

      21fc661f63f2ffff0e141ba8b78dc88c57bd647b

    • SHA256

      343c657c014a2bc8ac6880ae030c17237710a8f92d7d0d41f64d06efda3e99e6

    • SHA512

      af54cf29203c0adaedd46f42fde040085798c9b517c74c823d1f8680451c76c07cdee31e9cf3339537b19f1b2fefe3b3af1cf161e4faf703f17dfaa3e15f5b7b

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Tasks