General

  • Target

    d02075e11831e9b95ca654063a249554.exe

  • Size

    780KB

  • Sample

    201101-cvrsnb5cxe

  • MD5

    d02075e11831e9b95ca654063a249554

  • SHA1

    ce46e830a3bdd48891c67e07786d3523ed89b9f5

  • SHA256

    9d7cd70852435e73846e3050cf060d345173d44df492593ea0821d023c0e7f67

  • SHA512

    5022601bc9d6436d4ac903d49dee44e89f8bf91eac6b8b240aa511c241946bfa43c312ae9b32b66a9c40e52bf48d06e3b374c4c7088af05eb54bec6e3133f0d6

Malware Config

Targets

    • Target

      d02075e11831e9b95ca654063a249554.exe

    • Size

      780KB

    • MD5

      d02075e11831e9b95ca654063a249554

    • SHA1

      ce46e830a3bdd48891c67e07786d3523ed89b9f5

    • SHA256

      9d7cd70852435e73846e3050cf060d345173d44df492593ea0821d023c0e7f67

    • SHA512

      5022601bc9d6436d4ac903d49dee44e89f8bf91eac6b8b240aa511c241946bfa43c312ae9b32b66a9c40e52bf48d06e3b374c4c7088af05eb54bec6e3133f0d6

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Remote System Discovery

1
T1018

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Tasks