General

  • Target

    ffe166719789285cb8ab083a94137ad78c98d9edeec988bcdd895c3654bd3b6c

  • Size

    451KB

  • Sample

    220211-q2am5acfh9

  • MD5

    5188db2362f2e89d3c32161988d6aec4

  • SHA1

    bc00444b3d719e979449d747f9f1d2f1eb75d665

  • SHA256

    ffe166719789285cb8ab083a94137ad78c98d9edeec988bcdd895c3654bd3b6c

  • SHA512

    76209d57757f9989b624f9751d453c820ce59bc3c019ffc9e41a109868eaa61eaee87be767b0179e6680e595b885057ad3b9fda63258500a9864cad6562b167b

Malware Config

Extracted

Family

redline

Botnet

ruzkiKAKOYTO

C2

185.215.113.29:20819

Attributes
  • auth_value

    44e87155dd7a4d1957a956ed040ff3fd

Targets

    • Target

      ffe166719789285cb8ab083a94137ad78c98d9edeec988bcdd895c3654bd3b6c

    • Size

      451KB

    • MD5

      5188db2362f2e89d3c32161988d6aec4

    • SHA1

      bc00444b3d719e979449d747f9f1d2f1eb75d665

    • SHA256

      ffe166719789285cb8ab083a94137ad78c98d9edeec988bcdd895c3654bd3b6c

    • SHA512

      76209d57757f9989b624f9751d453c820ce59bc3c019ffc9e41a109868eaa61eaee87be767b0179e6680e595b885057ad3b9fda63258500a9864cad6562b167b

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Tasks