General

  • Target

    file.exe

  • Size

    1.1MB

  • Sample

    221205-2kc8gadg22

  • MD5

    2cc6354fb80aba5b598e03acd73b8a58

  • SHA1

    0285e5f32a8241f668e2bfdf6fbb50b5fe85425a

  • SHA256

    38a4aa886e31b053da14946bda69bffcdbc9278c95d943d5f8b16bdf5a3e3915

  • SHA512

    5dd895fb7d166fdc474f6d725a57d4fb9c3ec163fabaabdf6b3330559387cd3a9cc64ab62f3ec5e5c0d3b4dbed4208b73889f288cde2becc7746e59c8cd308cc

  • SSDEEP

    12288:ErkSnXEju456VTVAXfWjMfYhA4RePTkIQg84cuGBwhv9:ErkSnXYuE6VTW9fYy4aoI8YGBC9

Malware Config

Extracted

Family

redline

Botnet

private

C2

151.80.89.227:45878

Attributes
  • auth_value

    60894ac4c1d4d6c9ffb36078809b8c34

Extracted

Family

redline

Botnet

0512

C2

81.161.229.143:26910

Attributes
  • auth_value

    c020923553bd23ba826df75b6d76d4de

Targets

    • Target

      file.exe

    • Size

      1.1MB

    • MD5

      2cc6354fb80aba5b598e03acd73b8a58

    • SHA1

      0285e5f32a8241f668e2bfdf6fbb50b5fe85425a

    • SHA256

      38a4aa886e31b053da14946bda69bffcdbc9278c95d943d5f8b16bdf5a3e3915

    • SHA512

      5dd895fb7d166fdc474f6d725a57d4fb9c3ec163fabaabdf6b3330559387cd3a9cc64ab62f3ec5e5c0d3b4dbed4208b73889f288cde2becc7746e59c8cd308cc

    • SSDEEP

      12288:ErkSnXEju456VTVAXfWjMfYhA4RePTkIQg84cuGBwhv9:ErkSnXYuE6VTW9fYy4aoI8YGBC9

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Tasks