General

  • Target

    f909ae906f46a0e498a50cf17dec5feb4549e4e6e9f2d3b019364cc1eea55c92

  • Size

    430KB

  • Sample

    220706-x7t3aagcel

  • MD5

    2ed3a9d630c87d7a0e42aeaed17881c1

  • SHA1

    6f03c13bb8fc868ff65349f04b510a3835934742

  • SHA256

    f909ae906f46a0e498a50cf17dec5feb4549e4e6e9f2d3b019364cc1eea55c92

  • SHA512

    4c3b252dfcc61f8ee1776bb2715c19a89477f2feeab79bd4cf0e8fafb9c01afb027ff37046449a15233a6546c2cac7b726f2982eeb6c8d2e0c4462443a454816

Malware Config

Extracted

Family

redline

Botnet

ib1.4

C2

levelcupsecurity.eu:80

Attributes
  • auth_value

    363e918b58f663fdb3c6d525cf98d4b0

Targets

    • Target

      f909ae906f46a0e498a50cf17dec5feb4549e4e6e9f2d3b019364cc1eea55c92

    • Size

      430KB

    • MD5

      2ed3a9d630c87d7a0e42aeaed17881c1

    • SHA1

      6f03c13bb8fc868ff65349f04b510a3835934742

    • SHA256

      f909ae906f46a0e498a50cf17dec5feb4549e4e6e9f2d3b019364cc1eea55c92

    • SHA512

      4c3b252dfcc61f8ee1776bb2715c19a89477f2feeab79bd4cf0e8fafb9c01afb027ff37046449a15233a6546c2cac7b726f2982eeb6c8d2e0c4462443a454816

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks