General

  • Target

    5df2f5ea171b35482f3a194ee158fe5e.exe

  • Size

    311KB

  • Sample

    201216-jzprjaxkme

  • MD5

    5df2f5ea171b35482f3a194ee158fe5e

  • SHA1

    9a2d956e350ad4a86998db3779eee41c5384eba4

  • SHA256

    7ad68e446a975c986f5b7eee1d08a588b40cb5ef301d0e689d92fc3446d7b0fb

  • SHA512

    49a8a8b8aacc10e6f5e4288b543eb0f8addf4d0241e59fb8ba23d5d74bf273de3415c52b1d063d01ddf05a4470917b1be710822fa9448b46a3c16d6b9a0412ab

Malware Config

Targets

    • Target

      5df2f5ea171b35482f3a194ee158fe5e.exe

    • Size

      311KB

    • MD5

      5df2f5ea171b35482f3a194ee158fe5e

    • SHA1

      9a2d956e350ad4a86998db3779eee41c5384eba4

    • SHA256

      7ad68e446a975c986f5b7eee1d08a588b40cb5ef301d0e689d92fc3446d7b0fb

    • SHA512

      49a8a8b8aacc10e6f5e4288b543eb0f8addf4d0241e59fb8ba23d5d74bf273de3415c52b1d063d01ddf05a4470917b1be710822fa9448b46a3c16d6b9a0412ab

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks