General

  • Target

    12d572b47612e25e4ade18f20824f8a58476ee614853b241476528f1033a49f6

  • Size

    409KB

  • Sample

    220519-1fep3aehap

  • MD5

    9e0c502a8d0bfa3e0a4dcab3279131b9

  • SHA1

    745aed37113f2d87e8ce34cbec397d9ac6696da5

  • SHA256

    12d572b47612e25e4ade18f20824f8a58476ee614853b241476528f1033a49f6

  • SHA512

    460665306b2a7cb28029cac57694abd6a6b17c19fd4acd4dc54b921ecf78c1c0dbf4c0ddf5efb16ee7cdf7f14d630ddc3c9240a95e8b7cff6cb997734cc05b8c

Malware Config

Extracted

Family

redline

Botnet

test1

C2

185.215.113.75:80

Attributes
  • auth_value

    7ab4a4e2eae9eb7ae10f64f68df53bb3

Targets

    • Target

      12d572b47612e25e4ade18f20824f8a58476ee614853b241476528f1033a49f6

    • Size

      409KB

    • MD5

      9e0c502a8d0bfa3e0a4dcab3279131b9

    • SHA1

      745aed37113f2d87e8ce34cbec397d9ac6696da5

    • SHA256

      12d572b47612e25e4ade18f20824f8a58476ee614853b241476528f1033a49f6

    • SHA512

      460665306b2a7cb28029cac57694abd6a6b17c19fd4acd4dc54b921ecf78c1c0dbf4c0ddf5efb16ee7cdf7f14d630ddc3c9240a95e8b7cff6cb997734cc05b8c

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks