General

  • Target

    425fa3a5d6422b4f9985ee493aefe613.exe

  • Size

    654KB

  • Sample

    210212-pmy86213w6

  • MD5

    425fa3a5d6422b4f9985ee493aefe613

  • SHA1

    2dfa3009b81ca30a1a73c3459aec5486f56a03d6

  • SHA256

    a766d92b540516fd0e6999039576799146073f3a8d5e3f8a196af2bc725489ad

  • SHA512

    f22cab9f647e226dffc4a37f39ebbee26c716afe746e58b430eb23f5c475d9bbccf297491d626e5100b9d6cd13e60c485115a1e4523ef19fdd02a6d8cb5e0c04

Malware Config

Targets

    • Target

      425fa3a5d6422b4f9985ee493aefe613.exe

    • Size

      654KB

    • MD5

      425fa3a5d6422b4f9985ee493aefe613

    • SHA1

      2dfa3009b81ca30a1a73c3459aec5486f56a03d6

    • SHA256

      a766d92b540516fd0e6999039576799146073f3a8d5e3f8a196af2bc725489ad

    • SHA512

      f22cab9f647e226dffc4a37f39ebbee26c716afe746e58b430eb23f5c475d9bbccf297491d626e5100b9d6cd13e60c485115a1e4523ef19fdd02a6d8cb5e0c04

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Enumerates physical storage devices

      Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Tasks