General

  • Target

    29399af9169953f804518c069d493cd76b76cf7c0d999f91619d764452dd5d00

  • Size

    384KB

  • Sample

    220523-dx1yasbfa2

  • MD5

    4ce566be08fe1a37af5e47a554ac96e0

  • SHA1

    85116e806e8d220bce8a33fb8053a312530dd782

  • SHA256

    29399af9169953f804518c069d493cd76b76cf7c0d999f91619d764452dd5d00

  • SHA512

    0557992ca3d4640627433ec9bec5fd86478f4f2bad1936d23deba9bf18a3176dddba46a547b3cf465433f40970e9906c271632ae5d95710a0696360fe093fa63

Malware Config

Extracted

Family

redline

Botnet

meta1

C2

193.106.191.182:23196

Attributes
  • auth_value

    9a16ce2cecb89012977449117f5e8d58

Targets

    • Target

      29399af9169953f804518c069d493cd76b76cf7c0d999f91619d764452dd5d00

    • Size

      384KB

    • MD5

      4ce566be08fe1a37af5e47a554ac96e0

    • SHA1

      85116e806e8d220bce8a33fb8053a312530dd782

    • SHA256

      29399af9169953f804518c069d493cd76b76cf7c0d999f91619d764452dd5d00

    • SHA512

      0557992ca3d4640627433ec9bec5fd86478f4f2bad1936d23deba9bf18a3176dddba46a547b3cf465433f40970e9906c271632ae5d95710a0696360fe093fa63

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks