General

  • Target

    be42138c007747b94d01e4b2b1698498.exe

  • Size

    1.4MB

  • Sample

    201102-e1gsd3lak2

  • MD5

    be42138c007747b94d01e4b2b1698498

  • SHA1

    67261c10902204f1aab2ae88d89325e705c76329

  • SHA256

    b4c89616a5a88bf22085f8f4322ad8935265dc5d34248bb1332dbc1d4537c9e8

  • SHA512

    c1e33805c33ac0889197fe5fd7eadbe037487bddd7cec5f30c4dc85d3ec1368fa4404cfb3c2afcf5d5d3638ac852c5c1b41b6537005405a052a893746007ae39

Malware Config

Targets

    • Target

      be42138c007747b94d01e4b2b1698498.exe

    • Size

      1.4MB

    • MD5

      be42138c007747b94d01e4b2b1698498

    • SHA1

      67261c10902204f1aab2ae88d89325e705c76329

    • SHA256

      b4c89616a5a88bf22085f8f4322ad8935265dc5d34248bb1332dbc1d4537c9e8

    • SHA512

      c1e33805c33ac0889197fe5fd7eadbe037487bddd7cec5f30c4dc85d3ec1368fa4404cfb3c2afcf5d5d3638ac852c5c1b41b6537005405a052a893746007ae39

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Deletes itself

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Remote System Discovery

1
T1018

Collection

Data from Local System

1
T1005

Tasks