General

  • Target

    https://www.youtube.com/redirect?event=comments&redir_token=QUFFLUhqazA4VVlJdERhN3hZTnItTUN0eXNBQW8xR1dNZ3xBQ3Jtc0tuczIyTUcyR2pvNWZxVFhfOFVZQXAzMGJFSG1FRV9rWlF4WnozaUxyVWJZendLOGs1YWp3Nmszbl9TZmM1cTZ5RlJIN1RXSURzLXVHWVlEUS1TSnhveW5rc1VNX25qNGgxWnpqODlRSGtTblhLY3h6MA&q=https%3A%2F%2Ftinyurl.com%2F34mcs45p

  • Sample

    240702-a83dqatfpk

Malware Config

Extracted

Family

redline

Botnet

@tronzzz

C2

94.228.166.68:80

Targets

    • Target

      https://www.youtube.com/redirect?event=comments&redir_token=QUFFLUhqazA4VVlJdERhN3hZTnItTUN0eXNBQW8xR1dNZ3xBQ3Jtc0tuczIyTUcyR2pvNWZxVFhfOFVZQXAzMGJFSG1FRV9rWlF4WnozaUxyVWJZendLOGs1YWp3Nmszbl9TZmM1cTZ5RlJIN1RXSURzLXVHWVlEUS1TSnhveW5rc1VNX25qNGgxWnpqODlRSGtTblhLY3h6MA&q=https%3A%2F%2Ftinyurl.com%2F34mcs45p

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks