General

  • Target

    a1009a665043a9366141359f5af1f4a3eceba51a158d2f65b999b92d5a2ef22f

  • Size

    295KB

  • Sample

    201108-rnhg28vcn2

  • MD5

    4a4c71b0d238f2d1d15402c4383d7c80

  • SHA1

    548221b83a591070caff816cd47a4a531b4b444b

  • SHA256

    a1009a665043a9366141359f5af1f4a3eceba51a158d2f65b999b92d5a2ef22f

  • SHA512

    c726906efbbb77f0faadda0601238f50935f6a4c6699b5292b08f0263dc92e31e511f78d2ef2dde2050cc4d696b7e8c69a9c235a8cfb47636ad7040ac2dfb14a

Malware Config

Targets

    • Target

      a1009a665043a9366141359f5af1f4a3eceba51a158d2f65b999b92d5a2ef22f

    • Size

      295KB

    • MD5

      4a4c71b0d238f2d1d15402c4383d7c80

    • SHA1

      548221b83a591070caff816cd47a4a531b4b444b

    • SHA256

      a1009a665043a9366141359f5af1f4a3eceba51a158d2f65b999b92d5a2ef22f

    • SHA512

      c726906efbbb77f0faadda0601238f50935f6a4c6699b5292b08f0263dc92e31e511f78d2ef2dde2050cc4d696b7e8c69a9c235a8cfb47636ad7040ac2dfb14a

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Tasks