General

  • Target

    8416f8c43b9315bb8e32bad187d9c45f.exe

  • Size

    360KB

  • Sample

    221110-ggamysfbh6

  • MD5

    8416f8c43b9315bb8e32bad187d9c45f

  • SHA1

    1cd1427dfe448408b0343f7c964623b21ec6405b

  • SHA256

    8701f05be1c34c7b4272cee9f268a8fd0373579ed43d3d43265609358f72b0ee

  • SHA512

    d7ee4f1a4c46469c107c20bd9a947fd5957adb97e188df5fa5455377c3ffa8539ceab123a069dd78e71dcaf6896739b682a3e1500faedfacbfa1b7c9d0eca248

  • SSDEEP

    6144:7DLUVDNfym3ZvbfVjZHBQfsN+PMjJrQoT8j78kAe8Xr8Ei7RXYWIZupaUfqlcUKg:7UNddbdjZHufDQ8x78kAe8Xr8Ei7RXYR

Malware Config

Extracted

Family

redline

Botnet

REDLINE

C2

80.66.87.60:80

Attributes
  • auth_value

    0031c8881e219bb78b7e6bf19f4b67c1

Targets

    • Target

      8416f8c43b9315bb8e32bad187d9c45f.exe

    • Size

      360KB

    • MD5

      8416f8c43b9315bb8e32bad187d9c45f

    • SHA1

      1cd1427dfe448408b0343f7c964623b21ec6405b

    • SHA256

      8701f05be1c34c7b4272cee9f268a8fd0373579ed43d3d43265609358f72b0ee

    • SHA512

      d7ee4f1a4c46469c107c20bd9a947fd5957adb97e188df5fa5455377c3ffa8539ceab123a069dd78e71dcaf6896739b682a3e1500faedfacbfa1b7c9d0eca248

    • SSDEEP

      6144:7DLUVDNfym3ZvbfVjZHBQfsN+PMjJrQoT8j78kAe8Xr8Ei7RXYWIZupaUfqlcUKg:7UNddbdjZHufDQ8x78kAe8Xr8Ei7RXYR

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks