General

  • Target

    2f1dfc83eb1cc80efead779c68054791

  • Size

    2.5MB

  • Sample

    220517-spk97sgeeq

  • MD5

    2f1dfc83eb1cc80efead779c68054791

  • SHA1

    14beea78488f5b3e8c2e8e2376713c01c86701a6

  • SHA256

    9decc60453eafb9217db9d5ee5eee169e67c957fd9c452e1d45b9a42aa67cd3a

  • SHA512

    2bb14a7a902ce318b853b3f402ca4cb8213c52125b5252dbd21f8bb19372da1b97b9310fb51b7b7aa18c060b1790f32f1e41c8ef5c4fb8746ec21aa80387a60b

Malware Config

Extracted

Family

redline

Botnet

Paladin

C2

193.150.103.38:40169

Attributes
  • auth_value

    27544084559b144244d7ad7299642a4c

Targets

    • Target

      2f1dfc83eb1cc80efead779c68054791

    • Size

      2.5MB

    • MD5

      2f1dfc83eb1cc80efead779c68054791

    • SHA1

      14beea78488f5b3e8c2e8e2376713c01c86701a6

    • SHA256

      9decc60453eafb9217db9d5ee5eee169e67c957fd9c452e1d45b9a42aa67cd3a

    • SHA512

      2bb14a7a902ce318b853b3f402ca4cb8213c52125b5252dbd21f8bb19372da1b97b9310fb51b7b7aa18c060b1790f32f1e41c8ef5c4fb8746ec21aa80387a60b

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hidden Files and Directories

1
T1158

Defense Evasion

Hidden Files and Directories

1
T1158

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Tasks