General

  • Target

    c241a906e50c78a868140398932c5f47.exe

  • Size

    528KB

  • Sample

    201213-smzqr7s8s6

  • MD5

    c241a906e50c78a868140398932c5f47

  • SHA1

    16eae974827f9a84de6c82b99232cee06ced4b99

  • SHA256

    e1676964811c0a12d9a4ef474d150ea11c4141e608cce5aaedef7c019b6f555f

  • SHA512

    bb734fe4c4170d7815dfc209ed07a1aec618d065cd6d815e2a50a417a9ad5835e023f4e12954e932521c25ac4adfa61e7a408f7ebced89f10b5bb6504c2ae1bc

Malware Config

Targets

    • Target

      c241a906e50c78a868140398932c5f47.exe

    • Size

      528KB

    • MD5

      c241a906e50c78a868140398932c5f47

    • SHA1

      16eae974827f9a84de6c82b99232cee06ced4b99

    • SHA256

      e1676964811c0a12d9a4ef474d150ea11c4141e608cce5aaedef7c019b6f555f

    • SHA512

      bb734fe4c4170d7815dfc209ed07a1aec618d065cd6d815e2a50a417a9ad5835e023f4e12954e932521c25ac4adfa61e7a408f7ebced89f10b5bb6504c2ae1bc

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks