General

  • Target

    dce7f7f47c57e9db55a166f4d30ec15f79361cd01faed46482c548b4d0637238

  • Size

    443KB

  • Sample

    220810-yjnq2aecbk

  • MD5

    e0c7442ada169ee34e94e916dc1a0344

  • SHA1

    7664e379168fa68e2072848753e6d2fa15906cf5

  • SHA256

    dce7f7f47c57e9db55a166f4d30ec15f79361cd01faed46482c548b4d0637238

  • SHA512

    beb3e863c7579602564cd22939fe132d9832e7844bd34427013faac50ea16afec4436cdbf8d441b5138b2f2ba71e86026228eb03b808c029eb8b97b4ff1edaa6

Malware Config

Extracted

Family

redline

Botnet

ruzki

C2

193.106.191.165:39482

Attributes
  • auth_value

    71a0558c0eea274a5bd617ea85786884

Targets

    • Target

      dce7f7f47c57e9db55a166f4d30ec15f79361cd01faed46482c548b4d0637238

    • Size

      443KB

    • MD5

      e0c7442ada169ee34e94e916dc1a0344

    • SHA1

      7664e379168fa68e2072848753e6d2fa15906cf5

    • SHA256

      dce7f7f47c57e9db55a166f4d30ec15f79361cd01faed46482c548b4d0637238

    • SHA512

      beb3e863c7579602564cd22939fe132d9832e7844bd34427013faac50ea16afec4436cdbf8d441b5138b2f2ba71e86026228eb03b808c029eb8b97b4ff1edaa6

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks