General

  • Target

    f4478de1dfeb26dae509d2c5f20eeb4b.exe

  • Size

    315KB

  • Sample

    220330-f6mhdagfg5

  • MD5

    f4478de1dfeb26dae509d2c5f20eeb4b

  • SHA1

    ff35f32a4a43a54512517f3e022c17fdbf918b05

  • SHA256

    33b73473e3c2757d2dc7f3e1dd94d06cdb2aff24cf32c8a8cd5ae44decb21e6d

  • SHA512

    5a8c96f040c11460d16968493b1d375a4f804539409ef5c9928fbea1c6fd75a572f76c099595c444b79065932ee6a6aad820cb8c8558ad88f58dd21301035c18

Malware Config

Extracted

Family

redline

Botnet

SHOP

C2

81.91.178.186:19410

Attributes
  • auth_value

    7273a6cb679b168231d3174961c76baa

Targets

    • Target

      f4478de1dfeb26dae509d2c5f20eeb4b.exe

    • Size

      315KB

    • MD5

      f4478de1dfeb26dae509d2c5f20eeb4b

    • SHA1

      ff35f32a4a43a54512517f3e022c17fdbf918b05

    • SHA256

      33b73473e3c2757d2dc7f3e1dd94d06cdb2aff24cf32c8a8cd5ae44decb21e6d

    • SHA512

      5a8c96f040c11460d16968493b1d375a4f804539409ef5c9928fbea1c6fd75a572f76c099595c444b79065932ee6a6aad820cb8c8558ad88f58dd21301035c18

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks