General

  • Target

    Installer.exe

  • Size

    700.0MB

  • Sample

    220730-pmywqsbffl

  • MD5

    40d4f96d2d61e133fb1e5ed913519d1a

  • SHA1

    c568b67141ad743982b06ccd1cdbb28450971c63

  • SHA256

    338c709ef0a8f67f35d7482ad902486e0d2bf2eb5c4ec88822fff879ea410ca3

  • SHA512

    dbca0f7032299078279580efa349758e7f305d3c3c7748b7ab8adb971e6bf12c46f12a2e1a468d542bcf701a6261d818f6e2a8b13ad005adae3cd8a1fb8ad4da

Malware Config

Extracted

Family

redline

Botnet

mix2

C2

185.215.113.98:8942

Attributes
  • auth_value

    0c8a87333f20ae8c0f5b594039fbada9

Targets

    • Target

      Installer.exe

    • Size

      700.0MB

    • MD5

      40d4f96d2d61e133fb1e5ed913519d1a

    • SHA1

      c568b67141ad743982b06ccd1cdbb28450971c63

    • SHA256

      338c709ef0a8f67f35d7482ad902486e0d2bf2eb5c4ec88822fff879ea410ca3

    • SHA512

      dbca0f7032299078279580efa349758e7f305d3c3c7748b7ab8adb971e6bf12c46f12a2e1a468d542bcf701a6261d818f6e2a8b13ad005adae3cd8a1fb8ad4da

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks