General

  • Target

    2e31bb2a664c08df661b6af6905a6702.exe

  • Size

    19KB

  • Sample

    200709-vg81lzdl6s

  • MD5

    2e31bb2a664c08df661b6af6905a6702

  • SHA1

    b48122cace403170b55457105cb0c43fac68ead2

  • SHA256

    cfac75f3ee6ba6f7816e73908f679a7c185b12044580c1f6b0cbf41dfe74b0f7

  • SHA512

    888bf0e7e2505f6f866dd2925d0740e8760308296e41888bf2d63240b7aabadb1621b845b8a6530ed6c727eb79a59b72eeab30d2eef1bb69aef1a4ced1e9000a

Malware Config

Targets

    • Target

      2e31bb2a664c08df661b6af6905a6702.exe

    • Size

      19KB

    • MD5

      2e31bb2a664c08df661b6af6905a6702

    • SHA1

      b48122cace403170b55457105cb0c43fac68ead2

    • SHA256

      cfac75f3ee6ba6f7816e73908f679a7c185b12044580c1f6b0cbf41dfe74b0f7

    • SHA512

      888bf0e7e2505f6f866dd2925d0740e8760308296e41888bf2d63240b7aabadb1621b845b8a6530ed6c727eb79a59b72eeab30d2eef1bb69aef1a4ced1e9000a

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks for installed software on the system

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Modifies system certificate store

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks