General

  • Target

    c4f4e2e9c897683510110592e08851aa.exe

  • Size

    431KB

  • Sample

    220521-zan6wagedl

  • MD5

    c4f4e2e9c897683510110592e08851aa

  • SHA1

    b8de0ccc5363fad357b7ef123298b05c87a2429c

  • SHA256

    9be9c226d1770430b003c7722d362a1d83d2e6896544826a1e4ad141a54d9865

  • SHA512

    10091c3f64b36015d5a3835ca62a2ecfbec1fe503d1c70662d6f9e6753992570446d2c9e2b146b03124d1868bb66dff3047fc1623b71d5a8a7b7e4d98447ab10

Malware Config

Extracted

Family

redline

Botnet

top

C2

iclarinyerac.xyz:81

manellylarii.xyz:81

Attributes
  • auth_value

    b66a08c69f913be894bbfce00805fab1

Targets

    • Target

      c4f4e2e9c897683510110592e08851aa.exe

    • Size

      431KB

    • MD5

      c4f4e2e9c897683510110592e08851aa

    • SHA1

      b8de0ccc5363fad357b7ef123298b05c87a2429c

    • SHA256

      9be9c226d1770430b003c7722d362a1d83d2e6896544826a1e4ad141a54d9865

    • SHA512

      10091c3f64b36015d5a3835ca62a2ecfbec1fe503d1c70662d6f9e6753992570446d2c9e2b146b03124d1868bb66dff3047fc1623b71d5a8a7b7e4d98447ab10

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks