General

  • Target

    e64a65d3a69e8f73be9e412ea79a19b31f962fa2aa3adac1356f04b36a6dc553

  • Size

    486KB

  • Sample

    220303-nldzhabae4

  • MD5

    a4ad32dc5c0845a72b616ba4126b0a19

  • SHA1

    81006db8784c26f577279e4afa69706e5f5adeb0

  • SHA256

    e64a65d3a69e8f73be9e412ea79a19b31f962fa2aa3adac1356f04b36a6dc553

  • SHA512

    8570fa1a94ba4c4400806b157446184635350da9a625fa0ad7471cf815fc225493fab2bd420bc07b71a4e28536760a41800573345733dc5da210d1687b98ea36

Malware Config

Extracted

Family

redline

Botnet

nnn

C2

194.87.218.126:47934

Attributes
  • auth_value

    d9bbe0cb156f55e7f4571b1c394baf28

Targets

    • Target

      e64a65d3a69e8f73be9e412ea79a19b31f962fa2aa3adac1356f04b36a6dc553

    • Size

      486KB

    • MD5

      a4ad32dc5c0845a72b616ba4126b0a19

    • SHA1

      81006db8784c26f577279e4afa69706e5f5adeb0

    • SHA256

      e64a65d3a69e8f73be9e412ea79a19b31f962fa2aa3adac1356f04b36a6dc553

    • SHA512

      8570fa1a94ba4c4400806b157446184635350da9a625fa0ad7471cf815fc225493fab2bd420bc07b71a4e28536760a41800573345733dc5da210d1687b98ea36

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks