General

  • Target

    9c2827e7f7a4c9a7c47e88f052c070b1.exe

  • Size

    582KB

  • Sample

    201104-h5vrvgmx5s

  • MD5

    9c2827e7f7a4c9a7c47e88f052c070b1

  • SHA1

    eb6d77adf05e13c95cce107d4e6e59df0a42f673

  • SHA256

    d7857e0b29661872c17e025785d8ec9074f580f9837ba148699756fecf2b1779

  • SHA512

    57f739684bae926ef6d0a90dc1db828a9917e12aa5b235d7a4f0780d62b86a631f4aa4eaeae0fa7e610eed0051aca806969987e7457e071a100b9e79fdc2e607

Malware Config

Targets

    • Target

      9c2827e7f7a4c9a7c47e88f052c070b1.exe

    • Size

      582KB

    • MD5

      9c2827e7f7a4c9a7c47e88f052c070b1

    • SHA1

      eb6d77adf05e13c95cce107d4e6e59df0a42f673

    • SHA256

      d7857e0b29661872c17e025785d8ec9074f580f9837ba148699756fecf2b1779

    • SHA512

      57f739684bae926ef6d0a90dc1db828a9917e12aa5b235d7a4f0780d62b86a631f4aa4eaeae0fa7e610eed0051aca806969987e7457e071a100b9e79fdc2e607

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Remote System Discovery

1
T1018

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Tasks