General

  • Target

    6563774617de1b4229cd69bdb823a4f2

  • Size

    365KB

  • Sample

    240105-a5pnfsegcq

  • MD5

    6563774617de1b4229cd69bdb823a4f2

  • SHA1

    71870a8e15d8a39d71e7934d84fa8c69c4e5b6a8

  • SHA256

    23d0ee7d7279e063ddbca86376557628ace23c767171798789cae2174767b31f

  • SHA512

    9ac611fb57f5c5778c3113745760bc81a4dce519e0d47e974ae7103c54d7290f89cee00475468aac7c8fb20cafe7c5604ce04052a7681f919113e5f8c4f9f67d

  • SSDEEP

    6144:rcR59r7BmrKxyn30tm7u9yMYeRewed+yYc7hyGvvis+EDE45PNUlRWPIvFn7yO+2:rcR59r7BPynwmLeUwe5YCyGiJ4YOgvFt

Malware Config

Extracted

Family

redline

Botnet

LiveTrafic

C2

20.79.30.95:13856

Targets

    • Target

      6563774617de1b4229cd69bdb823a4f2

    • Size

      365KB

    • MD5

      6563774617de1b4229cd69bdb823a4f2

    • SHA1

      71870a8e15d8a39d71e7934d84fa8c69c4e5b6a8

    • SHA256

      23d0ee7d7279e063ddbca86376557628ace23c767171798789cae2174767b31f

    • SHA512

      9ac611fb57f5c5778c3113745760bc81a4dce519e0d47e974ae7103c54d7290f89cee00475468aac7c8fb20cafe7c5604ce04052a7681f919113e5f8c4f9f67d

    • SSDEEP

      6144:rcR59r7BmrKxyn30tm7u9yMYeRewed+yYc7hyGvvis+EDE45PNUlRWPIvFn7yO+2:rcR59r7BPynwmLeUwe5YCyGiJ4YOgvFt

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Tasks