General

  • Target

    d874aae273bdb89a3cbcee1a6635d812e9438aa3389880e86b55d27c3037f880

  • Size

    419KB

  • Sample

    220528-rpvm7schb5

  • MD5

    074b8fc138bf56b5efbedc9f0bd38ba8

  • SHA1

    7c2244f989865206bfa5b3a2bb1fee90db7c2f58

  • SHA256

    d874aae273bdb89a3cbcee1a6635d812e9438aa3389880e86b55d27c3037f880

  • SHA512

    43f2595f073204ad3ee656ee995fabc29b13cde151076cde9aaa12794b3a528d991d3a289d90ce8542b73e7a9eab2c40f5433b1b0c83a5ed704f94ece5a1b119

Malware Config

Extracted

Family

redline

Botnet

RuzkiUNIKALNO

C2

193.233.48.58:38989

Attributes
  • auth_value

    c504b04cfbdd4bf85ce6195bcb37fba6

Targets

    • Target

      d874aae273bdb89a3cbcee1a6635d812e9438aa3389880e86b55d27c3037f880

    • Size

      419KB

    • MD5

      074b8fc138bf56b5efbedc9f0bd38ba8

    • SHA1

      7c2244f989865206bfa5b3a2bb1fee90db7c2f58

    • SHA256

      d874aae273bdb89a3cbcee1a6635d812e9438aa3389880e86b55d27c3037f880

    • SHA512

      43f2595f073204ad3ee656ee995fabc29b13cde151076cde9aaa12794b3a528d991d3a289d90ce8542b73e7a9eab2c40f5433b1b0c83a5ed704f94ece5a1b119

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks