General

  • Target

    3024-41-0x0000000000DA0000-0x0000000001174000-memory.dmp

  • Size

    3.8MB

  • Sample

    240424-rtms6abf2z

  • MD5

    6b71fdd8f1f9038328a59a3add0d2ef1

  • SHA1

    44332545b7142fb020553dc8d6e01d6bdf5be4fc

  • SHA256

    3c87b34647d231b32d8857ecf8878b402990014931cc2c44596a1a00793e8662

  • SHA512

    6e3478c75a90016985959cdedb76af1618f521c3c52da9b23890fccde65591dfb7880c182f426edc0cb4dc86ae3856d1affa6d4ae7c60381eb284a51442f60cb

  • SSDEEP

    98304:a0P6oiUwKDrZIgCyILFGjPtHIaH83kT1:a0lIBtFq1H78E

Malware Config

Extracted

Family

redline

Botnet

bild1

C2

193.233.132.169:37732

Targets

    • Target

      3024-41-0x0000000000DA0000-0x0000000001174000-memory.dmp

    • Size

      3.8MB

    • MD5

      6b71fdd8f1f9038328a59a3add0d2ef1

    • SHA1

      44332545b7142fb020553dc8d6e01d6bdf5be4fc

    • SHA256

      3c87b34647d231b32d8857ecf8878b402990014931cc2c44596a1a00793e8662

    • SHA512

      6e3478c75a90016985959cdedb76af1618f521c3c52da9b23890fccde65591dfb7880c182f426edc0cb4dc86ae3856d1affa6d4ae7c60381eb284a51442f60cb

    • SSDEEP

      98304:a0P6oiUwKDrZIgCyILFGjPtHIaH83kT1:a0lIBtFq1H78E

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Subvert Trust Controls

1
T1553

Install Root Certificate

1
T1553.004

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Tasks