General

  • Target

    file.exe

  • Size

    54KB

  • Sample

    220920-wcvjwseah9

  • MD5

    1e2f6f150a9ed8419a02748c81220cbd

  • SHA1

    e9dedbb568fe50dacfd909d560ca5c61ef60e93b

  • SHA256

    cdb773860277224fd715015f6a4a1282b8202de3b654cdbc89f3aa5d8d7fe245

  • SHA512

    b3d946f7845c4d29edc074cdf66774ff36fe0008661c2dc50c4e61eac7d295ae42884e693dc33fb40e3723ccb487e26ffc278c6085adeb23a59d4b505f4522cc

  • SSDEEP

    1536:uZmQZtL4cCWP4AjMKHKvV34nw9YkpzySJ3gOTMnJvajD5:SZpjMKqvVInw9YkpzySJFZ

Malware Config

Extracted

Family

redline

Botnet

20.09

C2

176.124.201.205:8800

Attributes
  • auth_value

    edabd6419a068519adaa84bf7ad79d04

Targets

    • Target

      file.exe

    • Size

      54KB

    • MD5

      1e2f6f150a9ed8419a02748c81220cbd

    • SHA1

      e9dedbb568fe50dacfd909d560ca5c61ef60e93b

    • SHA256

      cdb773860277224fd715015f6a4a1282b8202de3b654cdbc89f3aa5d8d7fe245

    • SHA512

      b3d946f7845c4d29edc074cdf66774ff36fe0008661c2dc50c4e61eac7d295ae42884e693dc33fb40e3723ccb487e26ffc278c6085adeb23a59d4b505f4522cc

    • SSDEEP

      1536:uZmQZtL4cCWP4AjMKHKvV34nw9YkpzySJ3gOTMnJvajD5:SZpjMKqvVInw9YkpzySJFZ

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Tasks