General

  • Target

    0x000600000001af23-1129.dat

  • Size

    175KB

  • Sample

    230328-d7vt2agg79

  • MD5

    2dc393e4c6f80a19fe01d610974f9d1b

  • SHA1

    d6f4798025f62b0134c82c01745e3a5f7dba3f70

  • SHA256

    a1063cf62e34e4fa89f85ed64ff74967026c5f1a9f6370dc6d7a15045f38afc6

  • SHA512

    d5c273c5d4d0bba2a8bd067c25e40ec6e0ce11badac9bb1bdb92f58402352a9de651a0e92d203ae76f7382696bb68eb32d2b4fee8be61a921f7b4b0bde676a3d

  • SSDEEP

    3072:jxqZWRZaPkOQ3TjmTseesFqh+XxNn2pU9f2MKTV/wi4lr55R9TxlnsPsUw0jOuwh:1qZoTjalqh

Malware Config

Extracted

Family

redline

Botnet

renta

C2

176.113.115.145:4125

Attributes
  • auth_value

    359596fd5b36e9925ade4d9a1846bafb

Targets

    • Target

      0x000600000001af23-1129.dat

    • Size

      175KB

    • MD5

      2dc393e4c6f80a19fe01d610974f9d1b

    • SHA1

      d6f4798025f62b0134c82c01745e3a5f7dba3f70

    • SHA256

      a1063cf62e34e4fa89f85ed64ff74967026c5f1a9f6370dc6d7a15045f38afc6

    • SHA512

      d5c273c5d4d0bba2a8bd067c25e40ec6e0ce11badac9bb1bdb92f58402352a9de651a0e92d203ae76f7382696bb68eb32d2b4fee8be61a921f7b4b0bde676a3d

    • SSDEEP

      3072:jxqZWRZaPkOQ3TjmTseesFqh+XxNn2pU9f2MKTV/wi4lr55R9TxlnsPsUw0jOuwh:1qZoTjalqh

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks