General

  • Target

    6fecb44a682a1d82f0e185ccd1785402.exe

  • Size

    591KB

  • Sample

    201104-avbymd1pwn

  • MD5

    6fecb44a682a1d82f0e185ccd1785402

  • SHA1

    9af42122c3135c9077c603b62a4baa88366bd864

  • SHA256

    56f814347c8ec650f905e26cb30343d437b587d8f663ac6bbf4ae4ca483898e1

  • SHA512

    dd0e02d922676f3a9516ddf2c86752dd27e2e03d9da02376392b2e57093b021be05e42a9fa7b45421bccf745e5ee0de44a11c0e2122b505f36b071e1ba92bc65

Malware Config

Targets

    • Target

      6fecb44a682a1d82f0e185ccd1785402.exe

    • Size

      591KB

    • MD5

      6fecb44a682a1d82f0e185ccd1785402

    • SHA1

      9af42122c3135c9077c603b62a4baa88366bd864

    • SHA256

      56f814347c8ec650f905e26cb30343d437b587d8f663ac6bbf4ae4ca483898e1

    • SHA512

      dd0e02d922676f3a9516ddf2c86752dd27e2e03d9da02376392b2e57093b021be05e42a9fa7b45421bccf745e5ee0de44a11c0e2122b505f36b071e1ba92bc65

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks