General

  • Target

    7b5682a746639f19d78104dbbdc629fb71e079d29aee4a15daefea7ee1680f53

  • Size

    272KB

  • Sample

    220811-3rgd5sgcg3

  • MD5

    efb7d30ee7ea7b5cafc3e06b568330d9

  • SHA1

    405d06200a00c20da24910ff769cc8a5fcbc2c65

  • SHA256

    07126a5fb676562b38b6039dd19971e4fc2f90acfd8199be583b0cbb6094432b

  • SHA512

    401066e3e5a09fd2cdda40770eb4189367cf30084fd4b225dca723532180e5915f315845c353a7a1fc6515406cc87b636358edbc55e644605880aa2341e0fa2c

Malware Config

Extracted

Family

redline

Botnet

ruzki

C2

193.106.191.165:39482

Attributes
  • auth_value

    71a0558c0eea274a5bd617ea85786884

Targets

    • Target

      7b5682a746639f19d78104dbbdc629fb71e079d29aee4a15daefea7ee1680f53

    • Size

      352KB

    • MD5

      fe3ac4d0e8dfb654ddeeb224bddcaacf

    • SHA1

      12428273d83136894092244deaa7570c6df6b4a1

    • SHA256

      7b5682a746639f19d78104dbbdc629fb71e079d29aee4a15daefea7ee1680f53

    • SHA512

      d860b3e20f0a5b0ad1e8578b764f59439abfcde0f001649c218d7da779495f521a458a2e8420c3a4630eb6e5045255bece7fc9deb53ac87d9501be4d115e25b9

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks