General

  • Target

    179eeb37a33fc6f628e4cf326d625e8c.exe

  • Size

    451KB

  • Sample

    220705-t8knfschb3

  • MD5

    179eeb37a33fc6f628e4cf326d625e8c

  • SHA1

    d00f0cbc0d179cb101c6c213c5d89ead0f3a8bdf

  • SHA256

    66ced17e8f99394602c467b64fbfe7a5d7edd48bf4557f73ee27a3a8cf9955c8

  • SHA512

    70b3597c8889ee45b26693a4c9b9a9e79e9954fb375e12422a02e3a1df7d4ec4c4b2d521223ebdb0e09f741f91ded3ded667bcb4edf5a7013cec3a9edd3492a9

Malware Config

Extracted

Family

redline

Botnet

Osman Lox

C2

159.69.32.75:31373

Attributes
  • auth_value

    9eb053388b7159dab7a9c0cba82ef776

Targets

    • Target

      179eeb37a33fc6f628e4cf326d625e8c.exe

    • Size

      451KB

    • MD5

      179eeb37a33fc6f628e4cf326d625e8c

    • SHA1

      d00f0cbc0d179cb101c6c213c5d89ead0f3a8bdf

    • SHA256

      66ced17e8f99394602c467b64fbfe7a5d7edd48bf4557f73ee27a3a8cf9955c8

    • SHA512

      70b3597c8889ee45b26693a4c9b9a9e79e9954fb375e12422a02e3a1df7d4ec4c4b2d521223ebdb0e09f741f91ded3ded667bcb4edf5a7013cec3a9edd3492a9

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks