General

  • Target

    0x0008000000013a8b-71.dat

  • Size

    102KB

  • Sample

    220324-zkb93aahen

  • MD5

    45ed3071803b83c772409ca27d59b450

  • SHA1

    d5c8365847583db6ea84b09a4877d6e4b8d11a4a

  • SHA256

    9b47990bfd7bd783dadfd534c4ba4f2d67c8044b39f24cf62ff2d96c9f78b88c

  • SHA512

    c09c39bffc40c1521609190004ecae9191e9ab4d10c214c2f6ee42f9575e681f753fc12cb550688287f840c228fccd8ba56d7eebd4b2c845031c2cc060c03553

Malware Config

Extracted

Family

redline

Botnet

1137502411

C2

193.232.179.34:20856

Attributes
  • auth_value

    bf80dce2076c6f3cb9ed05b510f4060e

Targets

    • Target

      0x0008000000013a8b-71.dat

    • Size

      102KB

    • MD5

      45ed3071803b83c772409ca27d59b450

    • SHA1

      d5c8365847583db6ea84b09a4877d6e4b8d11a4a

    • SHA256

      9b47990bfd7bd783dadfd534c4ba4f2d67c8044b39f24cf62ff2d96c9f78b88c

    • SHA512

      c09c39bffc40c1521609190004ecae9191e9ab4d10c214c2f6ee42f9575e681f753fc12cb550688287f840c228fccd8ba56d7eebd4b2c845031c2cc060c03553

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks