General

  • Target

    2215a6899763c1b3ff74af19a9ff8cb11a7032efe2367560aa31811431daff88

  • Size

    361KB

  • Sample

    240107-17z53sfcfq

  • MD5

    202cb6c429aa5d518237849225c927c7

  • SHA1

    58eb50cb2c82a884c28d708cae6bee126b9a8794

  • SHA256

    2215a6899763c1b3ff74af19a9ff8cb11a7032efe2367560aa31811431daff88

  • SHA512

    071a348b0fc6ffbc3925e637acce0c0a58f21a90894e6f7e7ff470eb08b8413f4318c2ff679886a9dfb6231382d17d119ff16847efc9173a402fe415acd03860

  • SSDEEP

    6144:q3u3ZZx6LArmoEI1XMopwv2GT3jMogsCT8jwi9I+Pvd/zaYZQmFGW3MRZe711J:3Z/60TEC/Q3QpsCawim+P1/zaYioV3Ms

Malware Config

Extracted

Family

redline

Botnet

LiveTrafic

C2

20.79.30.95:13856

Targets

    • Target

      2215a6899763c1b3ff74af19a9ff8cb11a7032efe2367560aa31811431daff88

    • Size

      361KB

    • MD5

      202cb6c429aa5d518237849225c927c7

    • SHA1

      58eb50cb2c82a884c28d708cae6bee126b9a8794

    • SHA256

      2215a6899763c1b3ff74af19a9ff8cb11a7032efe2367560aa31811431daff88

    • SHA512

      071a348b0fc6ffbc3925e637acce0c0a58f21a90894e6f7e7ff470eb08b8413f4318c2ff679886a9dfb6231382d17d119ff16847efc9173a402fe415acd03860

    • SSDEEP

      6144:q3u3ZZx6LArmoEI1XMopwv2GT3jMogsCT8jwi9I+Pvd/zaYZQmFGW3MRZe711J:3Z/60TEC/Q3QpsCawim+P1/zaYioV3Ms

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Tasks