General

  • Target

    097d0f102d1c4ca490caf9ecf7c2fd106959a3b97d0f856706f5452af5bee2a3

  • Size

    217KB

  • Sample

    220805-v512psfed4

  • MD5

    866712ff3ee1a86a3d7e31f47a05bc1a

  • SHA1

    96db9c850937da4bf477292f45ad13a9badd1beb

  • SHA256

    097d0f102d1c4ca490caf9ecf7c2fd106959a3b97d0f856706f5452af5bee2a3

  • SHA512

    04ab6240596242101a1f2d628fcaddc8369a1d0496b1f817f9cecd7b22a9c8048cc4312337f94133b4fda97e5c1b61a8887a010b0e8e7e107597780d571c19cd

Malware Config

Extracted

Family

redline

Botnet

AF2

C2

stcontact.top:80

Attributes
  • auth_value

    4d729a2faecb406a0eb1d6fcf30432fa

Targets

    • Target

      097d0f102d1c4ca490caf9ecf7c2fd106959a3b97d0f856706f5452af5bee2a3

    • Size

      217KB

    • MD5

      866712ff3ee1a86a3d7e31f47a05bc1a

    • SHA1

      96db9c850937da4bf477292f45ad13a9badd1beb

    • SHA256

      097d0f102d1c4ca490caf9ecf7c2fd106959a3b97d0f856706f5452af5bee2a3

    • SHA512

      04ab6240596242101a1f2d628fcaddc8369a1d0496b1f817f9cecd7b22a9c8048cc4312337f94133b4fda97e5c1b61a8887a010b0e8e7e107597780d571c19cd

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Tasks