General

  • Target

    c2129725fe0ece870ee9ab1b0db5a5472738fae47347c.exe

  • Size

    397KB

  • Sample

    230129-w27kraac6y

  • MD5

    07e2ee0ab61c20d88cf71b1bfaab872d

  • SHA1

    19d0ab3f538b693a099c48f715848258bf8e6d99

  • SHA256

    c2129725fe0ece870ee9ab1b0db5a5472738fae47347c389fa936b20876f176f

  • SHA512

    3ec0f76f0a9218a0cb6422833eef683207d6319599e611d09001b6ea01047ff3f17e75075190651dda22946092b6c35d250502f1cf616516142626e2e7509e7d

  • SSDEEP

    6144:/LUP+bNahJrJtAGyApbDKVHy55J2uuaXO/SzgYbLs7VlB2reEWajAqf:/4qNerASTAZ1wYjWV

Malware Config

Extracted

Family

redline

Botnet

fredy

C2

62.204.41.170:4132

Attributes
  • auth_value

    880249eef9593d49a1a3cddf57c5cb35

Targets

    • Target

      c2129725fe0ece870ee9ab1b0db5a5472738fae47347c.exe

    • Size

      397KB

    • MD5

      07e2ee0ab61c20d88cf71b1bfaab872d

    • SHA1

      19d0ab3f538b693a099c48f715848258bf8e6d99

    • SHA256

      c2129725fe0ece870ee9ab1b0db5a5472738fae47347c389fa936b20876f176f

    • SHA512

      3ec0f76f0a9218a0cb6422833eef683207d6319599e611d09001b6ea01047ff3f17e75075190651dda22946092b6c35d250502f1cf616516142626e2e7509e7d

    • SSDEEP

      6144:/LUP+bNahJrJtAGyApbDKVHy55J2uuaXO/SzgYbLs7VlB2reEWajAqf:/4qNerASTAZ1wYjWV

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks