General

  • Target

    208bb799af7725b1e09f31a53db1b9fae966937cca623361e376d84510aadb68

  • Size

    338KB

  • Sample

    220811-xjm9tsdca7

  • MD5

    59f846c1852fcdda1d7783f61f255f06

  • SHA1

    07b519e82448ba3f487167d850e6b20cb0c33c8e

  • SHA256

    208bb799af7725b1e09f31a53db1b9fae966937cca623361e376d84510aadb68

  • SHA512

    2c63ee475eca91083582fbf19784007b06e50c231466c617338601d0536550991e763268fbb22f4ede37f4e445b0c706545489a0b5bb3a8486b0729d78e6d281

Malware Config

Extracted

Family

redline

Botnet

ruzki

C2

193.106.191.165:39482

Attributes
  • auth_value

    71a0558c0eea274a5bd617ea85786884

Targets

    • Target

      208bb799af7725b1e09f31a53db1b9fae966937cca623361e376d84510aadb68

    • Size

      338KB

    • MD5

      59f846c1852fcdda1d7783f61f255f06

    • SHA1

      07b519e82448ba3f487167d850e6b20cb0c33c8e

    • SHA256

      208bb799af7725b1e09f31a53db1b9fae966937cca623361e376d84510aadb68

    • SHA512

      2c63ee475eca91083582fbf19784007b06e50c231466c617338601d0536550991e763268fbb22f4ede37f4e445b0c706545489a0b5bb3a8486b0729d78e6d281

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks