General

  • Target

    ad180dbae8a7180ff407e1d7ddca5d41e1b990fd8770f22e725db7a774a9b01c

  • Size

    416KB

  • Sample

    220201-an8p1aeafl

  • MD5

    f63f936c5ccf0740d36deaf35c2c4cdd

  • SHA1

    01e84ad79fee0e712194b7915078f220c339b78e

  • SHA256

    ad180dbae8a7180ff407e1d7ddca5d41e1b990fd8770f22e725db7a774a9b01c

  • SHA512

    5b155795266f5c473ac15ef0d68251168a9f8cf162831c9d7d01bd665d8a04bfc54aa38fce9a7f0c0731ac5b1ccbae76ca24e2f0ea04f46d8113ec9ef40388ac

Malware Config

Extracted

Family

redline

Botnet

ruzkiKAKOYTO

C2

185.215.113.29:20819

Targets

    • Target

      ad180dbae8a7180ff407e1d7ddca5d41e1b990fd8770f22e725db7a774a9b01c

    • Size

      416KB

    • MD5

      f63f936c5ccf0740d36deaf35c2c4cdd

    • SHA1

      01e84ad79fee0e712194b7915078f220c339b78e

    • SHA256

      ad180dbae8a7180ff407e1d7ddca5d41e1b990fd8770f22e725db7a774a9b01c

    • SHA512

      5b155795266f5c473ac15ef0d68251168a9f8cf162831c9d7d01bd665d8a04bfc54aa38fce9a7f0c0731ac5b1ccbae76ca24e2f0ea04f46d8113ec9ef40388ac

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Tasks