General

  • Target

    file.exe

  • Size

    2.2MB

  • Sample

    221213-1erm8sag2t

  • MD5

    18ed18d3d49f109b43ffe102390bed97

  • SHA1

    9ed4e6ae8624cb14e7e20ebac5fe867befa774d4

  • SHA256

    5d89f9a108d20c4b739c25e8d566ab61e14c2f12c1b425b449434e7a154049a4

  • SHA512

    7a5c648c52c59e000291136601476ca36948cccda3db0f7cbccf3c1b98310c3cf717bd9ff7cf650803f2d001431f64f7143bd603691109261e921cfa851d4606

  • SSDEEP

    49152:Map/syq3hXVQTmOvyjDj+AHUBYH2q9ZzwfyFpD0lUhdK/7ksfCW:d5sy2hy9yhTnDzwfyDoU/K/7BCW

Malware Config

Extracted

Family

redline

Botnet

TORRENTOLD

C2

amrican-sport-live-stream.cc:4581

Attributes
  • auth_value

    74e1b58bf920611f04c0e3919954fe05

Targets

    • Target

      file.exe

    • Size

      2.2MB

    • MD5

      18ed18d3d49f109b43ffe102390bed97

    • SHA1

      9ed4e6ae8624cb14e7e20ebac5fe867befa774d4

    • SHA256

      5d89f9a108d20c4b739c25e8d566ab61e14c2f12c1b425b449434e7a154049a4

    • SHA512

      7a5c648c52c59e000291136601476ca36948cccda3db0f7cbccf3c1b98310c3cf717bd9ff7cf650803f2d001431f64f7143bd603691109261e921cfa851d4606

    • SSDEEP

      49152:Map/syq3hXVQTmOvyjDj+AHUBYH2q9ZzwfyFpD0lUhdK/7ksfCW:d5sy2hy9yhTnDzwfyDoU/K/7BCW

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks