General

  • Target

    atikmdag-patcher 1.4.7.exe

  • Size

    6.3MB

  • Sample

    210119-fjk1ya3dgx

  • MD5

    1e43d60694f42e1c1360f484a3d8af44

  • SHA1

    f347872032eba7c0a83e3b02a320d0ff822a41f1

  • SHA256

    08dbec2319a6dc6fc42ac20e63560ff2796b9106ab9cfd4ea3974b45460f4c6b

  • SHA512

    a428139d5f4238289cc1d30918046f503e496ef5ad0275e6d4e828c1f928fb201b83155fec1676c12b185dba40667a4a8b579200c787e9a88a2e53d24947f9eb

Malware Config

Targets

    • Target

      atikmdag-patcher 1.4.7.exe

    • Size

      6.3MB

    • MD5

      1e43d60694f42e1c1360f484a3d8af44

    • SHA1

      f347872032eba7c0a83e3b02a320d0ff822a41f1

    • SHA256

      08dbec2319a6dc6fc42ac20e63560ff2796b9106ab9cfd4ea3974b45460f4c6b

    • SHA512

      a428139d5f4238289cc1d30918046f503e496ef5ad0275e6d4e828c1f928fb201b83155fec1676c12b185dba40667a4a8b579200c787e9a88a2e53d24947f9eb

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Executes dropped EXE

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks