General

  • Target

    1a6760ebbff9dfbd8cff877a303df66a.bin.zip

  • Size

    619KB

  • Sample

    201225-btq2xbg5mn

  • MD5

    6d5d1501666e57b38a399e80c557d43e

  • SHA1

    b5fed980eb4e9153b950d9c9cf56aa69faeff0c9

  • SHA256

    068a9379aeff06e18446ced837008144246eece901de103d6b83805a8e5e205a

  • SHA512

    90db2c33e4308539bd32e59b08e90eb0e132aa21fe23b4dd01eae0bc030a280d99131437a1168f0892fc8b2b81c11bcd9b019759742d1115cec8c9c6cbd75936

Malware Config

Targets

    • Target

      1a6760ebbff9dfbd8cff877a303df66a.bin

    • Size

      689KB

    • MD5

      1a6760ebbff9dfbd8cff877a303df66a

    • SHA1

      e66d7e55d74548dea55aeeb0eed3284a8a1c1a28

    • SHA256

      96bbdcb417228948effc7c21ddc3a08addcaa2421dca8870b64ea4f9f691dddd

    • SHA512

      a130b99c5fee0afa3958bbb0972d7a4770d601065e14cd6ea957d34a6d00edffdafd9bf822bf7d1609e79333ffa53e24735cf4a550ee900493f516fbbad2b615

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks