General

  • Target

    d375efe543768ff0990e46d26d8392f161543d81377cb690ae051f0e0270e305

  • Size

    355KB

  • Sample

    220811-sky1hagfhk

  • MD5

    8a7bcc46d2c87afbbb5c51e035c48ecc

  • SHA1

    8aaeae4f1ccad6fbc6f6c9064ec3be7b92a37784

  • SHA256

    d375efe543768ff0990e46d26d8392f161543d81377cb690ae051f0e0270e305

  • SHA512

    0b352650ef2d9e6c0725a7b7a6fa6ef022e1ad536c2489e7485cc46a6ff7ac673f453a9331ddb95ca0b909b6f77070d76b92c374e8ff7f378034b2b7a81fdb5f

Malware Config

Extracted

Family

redline

Botnet

ruzki

C2

193.106.191.165:39482

Attributes
  • auth_value

    71a0558c0eea274a5bd617ea85786884

Targets

    • Target

      d375efe543768ff0990e46d26d8392f161543d81377cb690ae051f0e0270e305

    • Size

      355KB

    • MD5

      8a7bcc46d2c87afbbb5c51e035c48ecc

    • SHA1

      8aaeae4f1ccad6fbc6f6c9064ec3be7b92a37784

    • SHA256

      d375efe543768ff0990e46d26d8392f161543d81377cb690ae051f0e0270e305

    • SHA512

      0b352650ef2d9e6c0725a7b7a6fa6ef022e1ad536c2489e7485cc46a6ff7ac673f453a9331ddb95ca0b909b6f77070d76b92c374e8ff7f378034b2b7a81fdb5f

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks