General

  • Target

    newload-crypted.exe

  • Size

    883KB

  • Sample

    210112-wj5czv5gj2

  • MD5

    64993cdc07881c3b1726f1bb8b15e6b2

  • SHA1

    49d7bb6f1cc42e53be2968f04d6f320128ee28b8

  • SHA256

    d43838212ddf94f2e613eeeaf305893081963706657e5588273a798e5ca5690d

  • SHA512

    da8a14c38666a6d3490942591ee35391d5a96b1b737c462f2b1c8e73a525c633b1f3b2a12520437e948aee39b3b546f52efff976797bb9998047c28de5f783ad

Malware Config

Targets

    • Target

      newload-crypted.exe

    • Size

      883KB

    • MD5

      64993cdc07881c3b1726f1bb8b15e6b2

    • SHA1

      49d7bb6f1cc42e53be2968f04d6f320128ee28b8

    • SHA256

      d43838212ddf94f2e613eeeaf305893081963706657e5588273a798e5ca5690d

    • SHA512

      da8a14c38666a6d3490942591ee35391d5a96b1b737c462f2b1c8e73a525c633b1f3b2a12520437e948aee39b3b546f52efff976797bb9998047c28de5f783ad

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks