General

  • Target

    87d557bfd2d8ec6c148f7ab47ee89d28.exe

  • Size

    689KB

  • Sample

    201224-fq4bp5qcn6

  • MD5

    87d557bfd2d8ec6c148f7ab47ee89d28

  • SHA1

    60e82a3efc232f93bc05762d25915d89726ba4cc

  • SHA256

    29197441b575d43a6acc86da8d4169458502f08ed7de1c052a1b300af2012936

  • SHA512

    eee5c74d3cf67aa6553023d0bdcc8ada985d02bc898d4cbd48124df0a0a1d6db8a4ef16fafb3b629e05db82f8e2507ac9c85a994e65ca6f437e191030309182e

Malware Config

Targets

    • Target

      87d557bfd2d8ec6c148f7ab47ee89d28.exe

    • Size

      689KB

    • MD5

      87d557bfd2d8ec6c148f7ab47ee89d28

    • SHA1

      60e82a3efc232f93bc05762d25915d89726ba4cc

    • SHA256

      29197441b575d43a6acc86da8d4169458502f08ed7de1c052a1b300af2012936

    • SHA512

      eee5c74d3cf67aa6553023d0bdcc8ada985d02bc898d4cbd48124df0a0a1d6db8a4ef16fafb3b629e05db82f8e2507ac9c85a994e65ca6f437e191030309182e

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks