General

  • Target

    1a6760ebbff9dfbd8cff877a303df66a.exe

  • Size

    689KB

  • Sample

    201225-lxc2n4hhhs

  • MD5

    1a6760ebbff9dfbd8cff877a303df66a

  • SHA1

    e66d7e55d74548dea55aeeb0eed3284a8a1c1a28

  • SHA256

    96bbdcb417228948effc7c21ddc3a08addcaa2421dca8870b64ea4f9f691dddd

  • SHA512

    a130b99c5fee0afa3958bbb0972d7a4770d601065e14cd6ea957d34a6d00edffdafd9bf822bf7d1609e79333ffa53e24735cf4a550ee900493f516fbbad2b615

Malware Config

Targets

    • Target

      1a6760ebbff9dfbd8cff877a303df66a.exe

    • Size

      689KB

    • MD5

      1a6760ebbff9dfbd8cff877a303df66a

    • SHA1

      e66d7e55d74548dea55aeeb0eed3284a8a1c1a28

    • SHA256

      96bbdcb417228948effc7c21ddc3a08addcaa2421dca8870b64ea4f9f691dddd

    • SHA512

      a130b99c5fee0afa3958bbb0972d7a4770d601065e14cd6ea957d34a6d00edffdafd9bf822bf7d1609e79333ffa53e24735cf4a550ee900493f516fbbad2b615

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks