General

  • Target

    8d05a08c17bac2c83c3cc2c7f44e361478a46c700541a483868fbe23060f2495

  • Size

    397KB

  • Sample

    220812-vr6d9sabc7

  • MD5

    31e59a9a83cce3ae9ad37a8b8ed6cf2e

  • SHA1

    ae20509f6bf1c8bc3ad6d521eaaf255a7001b3bd

  • SHA256

    8d05a08c17bac2c83c3cc2c7f44e361478a46c700541a483868fbe23060f2495

  • SHA512

    2637212606f10c20ae5c0bdc5a9e7eadd77dd2e7d403c512bf9b5668530dfcaaec9635adbdeeab9fb329a04981aedb1690dde417274e342aa6d94ca9d70920ec

Malware Config

Extracted

Family

redline

Botnet

ruzki

C2

193.106.191.165:39482

Attributes
  • auth_value

    71a0558c0eea274a5bd617ea85786884

Targets

    • Target

      8d05a08c17bac2c83c3cc2c7f44e361478a46c700541a483868fbe23060f2495

    • Size

      397KB

    • MD5

      31e59a9a83cce3ae9ad37a8b8ed6cf2e

    • SHA1

      ae20509f6bf1c8bc3ad6d521eaaf255a7001b3bd

    • SHA256

      8d05a08c17bac2c83c3cc2c7f44e361478a46c700541a483868fbe23060f2495

    • SHA512

      2637212606f10c20ae5c0bdc5a9e7eadd77dd2e7d403c512bf9b5668530dfcaaec9635adbdeeab9fb329a04981aedb1690dde417274e342aa6d94ca9d70920ec

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks