General

  • Target

    1ba281bb17b3859c4b3905e405ae40b5349ed20ffa1ae7d9c8504db40f6cbdc4

  • Size

    143KB

  • Sample

    220909-h1wvzagff8

  • MD5

    34e64e81d441e798ba74bc4dd267c279

  • SHA1

    02470dae54aa93ddc8c3f75bab5d9a576c466707

  • SHA256

    1ba281bb17b3859c4b3905e405ae40b5349ed20ffa1ae7d9c8504db40f6cbdc4

  • SHA512

    f8f92e4a734c221b228292f8d214a967445d52d176210e4b35dbfca1cff08861db55276c9ee7b9595b9d1b94907057ac8dc8938da6fbdb6f2fc5f64c0d15f20c

  • SSDEEP

    3072:WG3JxBjzZg8SgeiD1VVeqwx2A/qO1OuQQAoD0wjF4LUAJke:B3DBjzZPSgeiD1VVeqwxz/qO1OcLdF4Z

Malware Config

Extracted

Family

redline

Botnet

Lyllkal.05.09

C2

185.215.113.216:21921

Attributes
  • auth_value

    2df530f82cb4bd0f6bef5527a1d5de70

Targets

    • Target

      1ba281bb17b3859c4b3905e405ae40b5349ed20ffa1ae7d9c8504db40f6cbdc4

    • Size

      143KB

    • MD5

      34e64e81d441e798ba74bc4dd267c279

    • SHA1

      02470dae54aa93ddc8c3f75bab5d9a576c466707

    • SHA256

      1ba281bb17b3859c4b3905e405ae40b5349ed20ffa1ae7d9c8504db40f6cbdc4

    • SHA512

      f8f92e4a734c221b228292f8d214a967445d52d176210e4b35dbfca1cff08861db55276c9ee7b9595b9d1b94907057ac8dc8938da6fbdb6f2fc5f64c0d15f20c

    • SSDEEP

      3072:WG3JxBjzZg8SgeiD1VVeqwx2A/qO1OuQQAoD0wjF4LUAJke:B3DBjzZPSgeiD1VVeqwxz/qO1OcLdF4Z

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks