General

  • Target

    e2111cb3b07841995b0a0e4678c69c85.exe

  • Size

    622KB

  • Sample

    210218-1fglj2zhys

  • MD5

    e2111cb3b07841995b0a0e4678c69c85

  • SHA1

    7d9d4ab1b35208d076d7fe45405e6986178a287d

  • SHA256

    b666325729d0aa8e49292441558e945d0075439d6e6a544181fe708864835383

  • SHA512

    653f1a0052bfc026cfff35c3ac4475e1e5f6cb2a2355ceb45f507c66b5e2898002c1c7a9d3af88634eba261020628c82406d6f978600a063a710b7e80c77e856

Malware Config

Targets

    • Target

      e2111cb3b07841995b0a0e4678c69c85.exe

    • Size

      622KB

    • MD5

      e2111cb3b07841995b0a0e4678c69c85

    • SHA1

      7d9d4ab1b35208d076d7fe45405e6986178a287d

    • SHA256

      b666325729d0aa8e49292441558e945d0075439d6e6a544181fe708864835383

    • SHA512

      653f1a0052bfc026cfff35c3ac4475e1e5f6cb2a2355ceb45f507c66b5e2898002c1c7a9d3af88634eba261020628c82406d6f978600a063a710b7e80c77e856

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Tasks