General

  • Target

    7b5682a746639f19d78104dbbdc629fb71e079d29aee4a15daefea7ee1680f53

  • Size

    272KB

  • Sample

    220812-adj9naeacl

  • MD5

    f50ec7324ada861708b19b9a9f392f35

  • SHA1

    0e949de927ca969991d40ec463cc0ad2c9a850b5

  • SHA256

    0ec86566ded651c99d1f89ea3e9180472defb481b044b215f3623dc177235f30

  • SHA512

    d3a748b99163830df5cbab96d2b35467d406d2b419c9a2e1e7e0080804c663a953384c44aa31847af629d281871b2aaeee6a20742ea39594398c7c5c2127a633

Malware Config

Extracted

Family

redline

Botnet

ruzki

C2

193.106.191.165:39482

Attributes
  • auth_value

    71a0558c0eea274a5bd617ea85786884

Targets

    • Target

      7b5682a746639f19d78104dbbdc629fb71e079d29aee4a15daefea7ee1680f53

    • Size

      352KB

    • MD5

      fe3ac4d0e8dfb654ddeeb224bddcaacf

    • SHA1

      12428273d83136894092244deaa7570c6df6b4a1

    • SHA256

      7b5682a746639f19d78104dbbdc629fb71e079d29aee4a15daefea7ee1680f53

    • SHA512

      d860b3e20f0a5b0ad1e8578b764f59439abfcde0f001649c218d7da779495f521a458a2e8420c3a4630eb6e5045255bece7fc9deb53ac87d9501be4d115e25b9

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks