General

  • Target

    zHZ2BojAkbDnZ8V.exe

  • Size

    555KB

  • Sample

    201224-csm6489flj

  • MD5

    76ec8923d9f639dd372b0824e4017de3

  • SHA1

    4fe30e32f1432de1ca11a7c722e94f8a115d7af5

  • SHA256

    59533cc77fe2b6b8afbb3bfbf4ea2a83c43152e24f713e46b3d6b7a44b16f289

  • SHA512

    40b9441308a0bc40a3a74111f203a7d8dfd295b1c1190f746f25b2362f3cdd9e87e72130fdd50ada7bf9d7ea7a03fd1663df3f5ba626393c3d50432695641633

Malware Config

Targets

    • Target

      zHZ2BojAkbDnZ8V.exe

    • Size

      555KB

    • MD5

      76ec8923d9f639dd372b0824e4017de3

    • SHA1

      4fe30e32f1432de1ca11a7c722e94f8a115d7af5

    • SHA256

      59533cc77fe2b6b8afbb3bfbf4ea2a83c43152e24f713e46b3d6b7a44b16f289

    • SHA512

      40b9441308a0bc40a3a74111f203a7d8dfd295b1c1190f746f25b2362f3cdd9e87e72130fdd50ada7bf9d7ea7a03fd1663df3f5ba626393c3d50432695641633

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks