General

  • Target

    20ab063f206eb8115fde1479e05c245e.exe

  • Size

    297KB

  • Sample

    240303-jcdj6afg23

  • MD5

    20ab063f206eb8115fde1479e05c245e

  • SHA1

    2088f3c51a5ad9e11da999a7114623274cc69692

  • SHA256

    5ec4818da47f24ac8762bf73d0395662639142f86b930db138e586c2eb91b29e

  • SHA512

    2dc3181d57ee616c1bb5860d0007d06c04ba1a693064fe7044d9f07939e99e54e8b2864ebbb7268118784a691037dad6756532bd149c74aeedc993d0d0e4a0c5

  • SSDEEP

    3072:lqFFrqwIOGEzyJNmWb7cGaXSf0vdSP/HqlYuJTZFfuIMcZqf7D34teqiOLCbBOj:sBIOGFiifzHqlpJTZhWcZqf7DIXL

Malware Config

Extracted

Family

redline

Botnet

gg

C2

67.203.7.148:2909

Targets

    • Target

      20ab063f206eb8115fde1479e05c245e.exe

    • Size

      297KB

    • MD5

      20ab063f206eb8115fde1479e05c245e

    • SHA1

      2088f3c51a5ad9e11da999a7114623274cc69692

    • SHA256

      5ec4818da47f24ac8762bf73d0395662639142f86b930db138e586c2eb91b29e

    • SHA512

      2dc3181d57ee616c1bb5860d0007d06c04ba1a693064fe7044d9f07939e99e54e8b2864ebbb7268118784a691037dad6756532bd149c74aeedc993d0d0e4a0c5

    • SSDEEP

      3072:lqFFrqwIOGEzyJNmWb7cGaXSf0vdSP/HqlYuJTZFfuIMcZqf7D34teqiOLCbBOj:sBIOGFiifzHqlpJTZhWcZqf7DIXL

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks