General

  • Target

    5444bb6ecd7a6a7cf116727b040dce76.exe

  • Size

    286KB

  • Sample

    220803-s7lzfscgd6

  • MD5

    5444bb6ecd7a6a7cf116727b040dce76

  • SHA1

    a6b4491e2725856660d813d6d584dab208ac4107

  • SHA256

    35e6c3107e12e99a041a0d5a1d467b9c985463d1c04ecef5b02a70ea52974133

  • SHA512

    03d11c8eeb016a3ee418383b440b670e6e75c565874a22e4201063e7ba9ed73bd0d9b4d4aeb3a57843516c532f7aab9b130142f516df30c9e5237d224c92b620

Malware Config

Extracted

Family

redline

Botnet

AF2

C2

stcontact.top:80

Attributes
  • auth_value

    4d729a2faecb406a0eb1d6fcf30432fa

Targets

    • Target

      5444bb6ecd7a6a7cf116727b040dce76.exe

    • Size

      286KB

    • MD5

      5444bb6ecd7a6a7cf116727b040dce76

    • SHA1

      a6b4491e2725856660d813d6d584dab208ac4107

    • SHA256

      35e6c3107e12e99a041a0d5a1d467b9c985463d1c04ecef5b02a70ea52974133

    • SHA512

      03d11c8eeb016a3ee418383b440b670e6e75c565874a22e4201063e7ba9ed73bd0d9b4d4aeb3a57843516c532f7aab9b130142f516df30c9e5237d224c92b620

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks