General

  • Target

    8f054f63dc9db8b44271b69ee32541db.exe

  • Size

    559KB

  • Sample

    201104-qym8df43ns

  • MD5

    8f054f63dc9db8b44271b69ee32541db

  • SHA1

    abeb36520bd5b6d9d91a54029ae8a0bbfb4ec82a

  • SHA256

    05797751460565ee0a402deabba76da1f83e0fb78d929499754d2a35a4bd8fb6

  • SHA512

    127cc8250896c374eba6075cf65744b7686598ff91528f6d8ffed83a173db2c8d136d17cd31e2d4c6a9f99169ad7a2bf9163d4a27f62844ffb978248d574ced8

Malware Config

Targets

    • Target

      8f054f63dc9db8b44271b69ee32541db.exe

    • Size

      559KB

    • MD5

      8f054f63dc9db8b44271b69ee32541db

    • SHA1

      abeb36520bd5b6d9d91a54029ae8a0bbfb4ec82a

    • SHA256

      05797751460565ee0a402deabba76da1f83e0fb78d929499754d2a35a4bd8fb6

    • SHA512

      127cc8250896c374eba6075cf65744b7686598ff91528f6d8ffed83a173db2c8d136d17cd31e2d4c6a9f99169ad7a2bf9163d4a27f62844ffb978248d574ced8

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks