General

  • Target

    1908-57-0x0000000000DA0000-0x0000000001872000-memory.dmp

  • Size

    10.8MB

  • Sample

    220804-ntlz3sede3

  • MD5

    d6e9f067c1b62542f7b277b50e1c1f16

  • SHA1

    368372613275bafd06a3d00e20198305bdc47ebf

  • SHA256

    f473e7910b282581adbaf6123cd1632d2c2241642cbc304074c5ced99b7cc409

  • SHA512

    f99e4a627ce4eecfcef55448e353375a5ef412cc0a2b7e05f463450dac766771402c696ff1972f9e9be02b55457ba75893f4fbba9af98303853ae2b74e5df602

Malware Config

Extracted

Family

redline

Botnet

1488

C2

46.21.250.111:65367

Attributes
  • auth_value

    e1f55d6c61f97af563fc8c06a2c97666

Targets

    • Target

      1908-57-0x0000000000DA0000-0x0000000001872000-memory.dmp

    • Size

      10.8MB

    • MD5

      d6e9f067c1b62542f7b277b50e1c1f16

    • SHA1

      368372613275bafd06a3d00e20198305bdc47ebf

    • SHA256

      f473e7910b282581adbaf6123cd1632d2c2241642cbc304074c5ced99b7cc409

    • SHA512

      f99e4a627ce4eecfcef55448e353375a5ef412cc0a2b7e05f463450dac766771402c696ff1972f9e9be02b55457ba75893f4fbba9af98303853ae2b74e5df602

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks