General

  • Target

    6d8fc5485484ff3a0efee3b5961dd07882f7ab55b472b5884a0a5199ca26f68e_dump.exe

  • Size

    294KB

  • Sample

    240701-2fcq5steqf

  • MD5

    e295671d8a71cd7a1ae699a2d47fa176

  • SHA1

    1066c6cb764d5c47e40e87f8511bd2410c0e787f

  • SHA256

    4e7c1a1fe4d6a92b37597aca22fd1701cb11071a225c9cd0673645b120fe77fe

  • SHA512

    90df34f4c6bfa111e368f27fe1733b4540d7e848fd45128e295ee7ad431d1469d3898c88db1ed02fd5fa7b57a49b0b31517473de1cefe3967af0bee744cb4107

  • SSDEEP

    3072:AcZqf7D34KpVMQGBOLNNxplzSpECsAbwst1TkxnqpXaAxyDeqiOL2bBOU:AcZqf7DIKOExplzSpKi1TkBuxytL

Malware Config

Extracted

Family

redline

C2

185.196.9.26:6302

Targets

    • Target

      6d8fc5485484ff3a0efee3b5961dd07882f7ab55b472b5884a0a5199ca26f68e_dump.exe

    • Size

      294KB

    • MD5

      e295671d8a71cd7a1ae699a2d47fa176

    • SHA1

      1066c6cb764d5c47e40e87f8511bd2410c0e787f

    • SHA256

      4e7c1a1fe4d6a92b37597aca22fd1701cb11071a225c9cd0673645b120fe77fe

    • SHA512

      90df34f4c6bfa111e368f27fe1733b4540d7e848fd45128e295ee7ad431d1469d3898c88db1ed02fd5fa7b57a49b0b31517473de1cefe3967af0bee744cb4107

    • SSDEEP

      3072:AcZqf7D34KpVMQGBOLNNxplzSpECsAbwst1TkxnqpXaAxyDeqiOL2bBOU:AcZqf7DIKOExplzSpKi1TkBuxytL

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks