General

  • Target

    593c354b3b09050c92d44a076a7a630a245790ab4fab6e872dbafd89e93cb132.zip

  • Size

    51KB

  • Sample

    230329-sv18lsgh26

  • MD5

    818795c60c0e74dc0fd978c553b65bf4

  • SHA1

    416c1c78f96c360db3baf8a6d2c102a2ab04c387

  • SHA256

    35d83d51625fa30384b4e982b6decc19ad34f01336d8c77b853a765875cc87f1

  • SHA512

    56e68c7058209dd329d225a58770b6159ff55bb12177671bf060483f21aba6d096a9d889187567969be9b41b79ec63d6e160c1ce23f177613236ffd8a42bac68

  • SSDEEP

    768:C/buWmSrFJW1Pi2P8MxmJ+zG9tclVeDM43jyFZdcsybuvkG7JKjVLdg5cCjTjPNN:GFJ+ApJSblVeDF0d8G7AuJTTtKTTiL

Malware Config

Extracted

Family

redline

Botnet

volya

C2

193.233.20.31:4125

Attributes
  • auth_value

    0efc9f002a9fbeec5f8b8338141d546a

Targets

    • Target

      593c354b3b09050c92d44a076a7a630a245790ab4fab6e872dbafd89e93cb132

    • Size

      175KB

    • MD5

      018b839c5ea1438099cd92f268570005

    • SHA1

      5c962942d01b46556c5f3d88a51ab865c051418c

    • SHA256

      593c354b3b09050c92d44a076a7a630a245790ab4fab6e872dbafd89e93cb132

    • SHA512

      67d7a260d200127fe6a6c0dee2bfdd6f84f6bdf3778a8033ae0d51eee1cd717328dba6ee4aff07e4522466317e790f7cd94440fe31adca06269db3d279c31010

    • SSDEEP

      3072:ZxqZW11a2kX8fPhSRFT/R/rPvBGb+eQcFbhsnxNn2pU9f2MKTV/wi4lr55R9TxlF:LqZkP8BPvY1bh

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks