General

  • Target

    71bac68eb27e02e20610cdc2098be85f.exe

  • Size

    667KB

  • Sample

    201102-3zv5pc2j8n

  • MD5

    71bac68eb27e02e20610cdc2098be85f

  • SHA1

    ec7446e7e3467cba4f93581d1dc1dc14dbc2abaa

  • SHA256

    3050e3feb871116d108140a8b0a82fb3b2a64b54148f7a49daaf3898c222d699

  • SHA512

    b298a76ecef5dc718f9db77ef63cfc2a5ab3dded8f3a9fa92dc81bfc8f7e9a39e729ae266a25452ec8961f5d21e49fe3236708582b75f08b302119a6ce33b3c6

Malware Config

Targets

    • Target

      71bac68eb27e02e20610cdc2098be85f.exe

    • Size

      667KB

    • MD5

      71bac68eb27e02e20610cdc2098be85f

    • SHA1

      ec7446e7e3467cba4f93581d1dc1dc14dbc2abaa

    • SHA256

      3050e3feb871116d108140a8b0a82fb3b2a64b54148f7a49daaf3898c222d699

    • SHA512

      b298a76ecef5dc718f9db77ef63cfc2a5ab3dded8f3a9fa92dc81bfc8f7e9a39e729ae266a25452ec8961f5d21e49fe3236708582b75f08b302119a6ce33b3c6

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

1
T1082

Remote System Discovery

1
T1018

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Tasks