General

  • Target

    e7115ecd83d3ff2ecc8acc6e54b22d88.exe

  • Size

    559KB

  • Sample

    201104-hvhqb4hjrx

  • MD5

    e7115ecd83d3ff2ecc8acc6e54b22d88

  • SHA1

    c0b3272d41db9478bf5bb4d3bb2ab3065d03b259

  • SHA256

    111ea9ab83c239454654597caefb2232929b96d9d24dd88aef5489e42bb48ce3

  • SHA512

    7ff4a298c8329c7229948e97d725de444e0778bcc9d816431f77e181891dbb67f5a5ecd573291eb725a6a4fc99fa7ac75a98ec8e36f91459ccecf5b5ae717de1

Malware Config

Targets

    • Target

      e7115ecd83d3ff2ecc8acc6e54b22d88.exe

    • Size

      559KB

    • MD5

      e7115ecd83d3ff2ecc8acc6e54b22d88

    • SHA1

      c0b3272d41db9478bf5bb4d3bb2ab3065d03b259

    • SHA256

      111ea9ab83c239454654597caefb2232929b96d9d24dd88aef5489e42bb48ce3

    • SHA512

      7ff4a298c8329c7229948e97d725de444e0778bcc9d816431f77e181891dbb67f5a5ecd573291eb725a6a4fc99fa7ac75a98ec8e36f91459ccecf5b5ae717de1

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks