General

  • Target

    2615d46217ee05259c2364739655f6d21e4773c9e9d510ade86ef93ec59bff83

  • Size

    25KB

  • Sample

    220701-qrnr1aecaq

  • MD5

    5f89ec18c865fbd1a4efd625df44c7ba

  • SHA1

    499013852da4a30e9734031abce8e81856f8e09d

  • SHA256

    2615d46217ee05259c2364739655f6d21e4773c9e9d510ade86ef93ec59bff83

  • SHA512

    99702b4c9283b04148ff4afd4c90e7dfa22a381cd5ddb1dc205cd381e4dac45cf264421b10830a5a237af2a8daa19f490412db5b1f1deecd250b0a8f84630d4d

Malware Config

Extracted

Family

redline

Botnet

build

C2

172.93.213.137:7525

Targets

    • Target

      2615d46217ee05259c2364739655f6d21e4773c9e9d510ade86ef93ec59bff83

    • Size

      25KB

    • MD5

      5f89ec18c865fbd1a4efd625df44c7ba

    • SHA1

      499013852da4a30e9734031abce8e81856f8e09d

    • SHA256

      2615d46217ee05259c2364739655f6d21e4773c9e9d510ade86ef93ec59bff83

    • SHA512

      99702b4c9283b04148ff4afd4c90e7dfa22a381cd5ddb1dc205cd381e4dac45cf264421b10830a5a237af2a8daa19f490412db5b1f1deecd250b0a8f84630d4d

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks