General

  • Target

    c769f765b5afffeaec73e202c12f496bf55876b1eaff2f7a693fe57d3e135f2b

  • Size

    489KB

  • Sample

    220202-r2taxaaff5

  • MD5

    3f667b290d74df1d35ca8722fcabaddb

  • SHA1

    d8cef66e90cb08dff0d4f016a970918b149dd256

  • SHA256

    c769f765b5afffeaec73e202c12f496bf55876b1eaff2f7a693fe57d3e135f2b

  • SHA512

    4df01ebb950e82c552e76bdac02f070ad4ed7b1d3816ce190b014a77dcc0996a74f39d2ced303ddee51c64a1f93ee09b7c9ed1291ad32de67e2345155122192a

Malware Config

Extracted

Family

redline

Botnet

1

C2

stata2021.best:21675

Targets

    • Target

      c769f765b5afffeaec73e202c12f496bf55876b1eaff2f7a693fe57d3e135f2b

    • Size

      489KB

    • MD5

      3f667b290d74df1d35ca8722fcabaddb

    • SHA1

      d8cef66e90cb08dff0d4f016a970918b149dd256

    • SHA256

      c769f765b5afffeaec73e202c12f496bf55876b1eaff2f7a693fe57d3e135f2b

    • SHA512

      4df01ebb950e82c552e76bdac02f070ad4ed7b1d3816ce190b014a77dcc0996a74f39d2ced303ddee51c64a1f93ee09b7c9ed1291ad32de67e2345155122192a

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks