General

  • Target

    270d130b3a0159cfb2f02aae3e8b268835d458d5fff7d525df73b04c9d1899f1

  • Size

    378KB

  • Sample

    220209-nptt5aacgj

  • MD5

    87f984e430078249e0057fc226919730

  • SHA1

    8e462fe09c2f0eaacdffe156cfd15313f4ead92d

  • SHA256

    270d130b3a0159cfb2f02aae3e8b268835d458d5fff7d525df73b04c9d1899f1

  • SHA512

    9b50c03122a5f442162605c74d24d3a3f439eb53bc35913776c84109167dc5bdc38e24c5ef0b1c8e0d54266c99c338117629f50c2215a36748a9a4d6758c6d76

Malware Config

Extracted

Family

redline

Botnet

noname

C2

185.215.113.29:20819

Targets

    • Target

      270d130b3a0159cfb2f02aae3e8b268835d458d5fff7d525df73b04c9d1899f1

    • Size

      378KB

    • MD5

      87f984e430078249e0057fc226919730

    • SHA1

      8e462fe09c2f0eaacdffe156cfd15313f4ead92d

    • SHA256

      270d130b3a0159cfb2f02aae3e8b268835d458d5fff7d525df73b04c9d1899f1

    • SHA512

      9b50c03122a5f442162605c74d24d3a3f439eb53bc35913776c84109167dc5bdc38e24c5ef0b1c8e0d54266c99c338117629f50c2215a36748a9a4d6758c6d76

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Tasks