General

  • Target

    0bb400582081d479bbf36c374b1b384a.exe

  • Size

    338KB

  • Sample

    210210-qbpx8stgas

  • MD5

    0bb400582081d479bbf36c374b1b384a

  • SHA1

    9a55d9786f73e1c4a81de9c965527717d169a29d

  • SHA256

    f4c347b4a344291c7e62fc77734b3e403358723874f7460ea4e2a6f2c3659b48

  • SHA512

    54c2035aa64df182c020b8e283ab6cd50988d4686c0889abee28ca03235d98bc2875151b7550d0c978839046d7841825dafb38509891a17beb7a733512d90508

Malware Config

Targets

    • Target

      0bb400582081d479bbf36c374b1b384a.exe

    • Size

      338KB

    • MD5

      0bb400582081d479bbf36c374b1b384a

    • SHA1

      9a55d9786f73e1c4a81de9c965527717d169a29d

    • SHA256

      f4c347b4a344291c7e62fc77734b3e403358723874f7460ea4e2a6f2c3659b48

    • SHA512

      54c2035aa64df182c020b8e283ab6cd50988d4686c0889abee28ca03235d98bc2875151b7550d0c978839046d7841825dafb38509891a17beb7a733512d90508

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates physical storage devices

      Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks