General

  • Target

    e877b89f41f94fe47c72bfa1ef23a1ab.exe

  • Size

    689KB

  • Sample

    201225-4p7anfqyc2

  • MD5

    e877b89f41f94fe47c72bfa1ef23a1ab

  • SHA1

    4710357367fca90f2a60dab12c9065c299f8d447

  • SHA256

    e17a2aac7627b6496732995db90d770d6aa29b0b6547913378140d398a8ba295

  • SHA512

    3144b2390bf7f647078e01def22947f6d0ab6bd8ad642dd80eaaa4fdcc8b5b65f4c27c1343472c56a189a63ec22e52d7e2859ddcf3efc70e9ab10339e667cc40

Malware Config

Targets

    • Target

      e877b89f41f94fe47c72bfa1ef23a1ab.exe

    • Size

      689KB

    • MD5

      e877b89f41f94fe47c72bfa1ef23a1ab

    • SHA1

      4710357367fca90f2a60dab12c9065c299f8d447

    • SHA256

      e17a2aac7627b6496732995db90d770d6aa29b0b6547913378140d398a8ba295

    • SHA512

      3144b2390bf7f647078e01def22947f6d0ab6bd8ad642dd80eaaa4fdcc8b5b65f4c27c1343472c56a189a63ec22e52d7e2859ddcf3efc70e9ab10339e667cc40

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks