General

  • Target

    527a69bf2acf2e3c08bc76c8af9191646099fb572a099fd207d33dc31585c072

  • Size

    383KB

  • Sample

    220209-17d8lsbfe4

  • MD5

    f5a59bd9a9aab27304745d9e2460ceff

  • SHA1

    221c78d94566a35f538f77fee94feb734ffb2092

  • SHA256

    527a69bf2acf2e3c08bc76c8af9191646099fb572a099fd207d33dc31585c072

  • SHA512

    00395f1203a2ba46250d6761a421f7eed216c16b44890a1e5535b227791ea055363201e8165c7894e7d80fbc24c8f63b5a50719171f9ee7801d3ae92c118dcc6

Malware Config

Extracted

Family

redline

Botnet

noname

C2

185.215.113.29:20819

Targets

    • Target

      527a69bf2acf2e3c08bc76c8af9191646099fb572a099fd207d33dc31585c072

    • Size

      383KB

    • MD5

      f5a59bd9a9aab27304745d9e2460ceff

    • SHA1

      221c78d94566a35f538f77fee94feb734ffb2092

    • SHA256

      527a69bf2acf2e3c08bc76c8af9191646099fb572a099fd207d33dc31585c072

    • SHA512

      00395f1203a2ba46250d6761a421f7eed216c16b44890a1e5535b227791ea055363201e8165c7894e7d80fbc24c8f63b5a50719171f9ee7801d3ae92c118dcc6

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Tasks