General

  • Target

    cee9ec3f7478e35f714fed6e080f2711.exe

  • Size

    1.4MB

  • Sample

    220129-f11g2seac7

  • MD5

    cee9ec3f7478e35f714fed6e080f2711

  • SHA1

    54173b65efb80cdeeaa1047329dbf20fc13d8ed7

  • SHA256

    d626d2dd320f5f66816bf3c97a8dd37f1be24b722fa32601c45e3be87791ed97

  • SHA512

    774695b4f5a4b253135337af2df7accf6506c5e3718d55b51fdcad2dddc8e7bc7882f9526085e1240cb72f7fba5833ddbe60d9e07eaa2f9d00199cd0d5ade808

Malware Config

Extracted

Family

redline

C2

49.12.47.66:27973

Extracted

Family

redline

Botnet

123

C2

46.3.199.85:4329

Targets

    • Target

      cee9ec3f7478e35f714fed6e080f2711.exe

    • Size

      1.4MB

    • MD5

      cee9ec3f7478e35f714fed6e080f2711

    • SHA1

      54173b65efb80cdeeaa1047329dbf20fc13d8ed7

    • SHA256

      d626d2dd320f5f66816bf3c97a8dd37f1be24b722fa32601c45e3be87791ed97

    • SHA512

      774695b4f5a4b253135337af2df7accf6506c5e3718d55b51fdcad2dddc8e7bc7882f9526085e1240cb72f7fba5833ddbe60d9e07eaa2f9d00199cd0d5ade808

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Tasks