General

  • Target

    18889b8e2068be41fd7c4cd9b5c2bfe4.exe

  • Size

    530KB

  • Sample

    210219-9cgpd7ecsa

  • MD5

    18889b8e2068be41fd7c4cd9b5c2bfe4

  • SHA1

    a670604471415e475443a752f53d02553d5b5de7

  • SHA256

    b2e0c72237dbad9cbd82ec93814b1b078779d3016d4e7d18b7bd5ff2cdeb9c68

  • SHA512

    bbe46d0e3808e3914793b969f4c9a92abafd3afb4cff5bc90ba9ea0a9ca3a07c15d6a3baf661c5b60a947efb1b1ae4c8edab3a9ed95522053a9d54d3bdccb5c4

Malware Config

Targets

    • Target

      18889b8e2068be41fd7c4cd9b5c2bfe4.exe

    • Size

      530KB

    • MD5

      18889b8e2068be41fd7c4cd9b5c2bfe4

    • SHA1

      a670604471415e475443a752f53d02553d5b5de7

    • SHA256

      b2e0c72237dbad9cbd82ec93814b1b078779d3016d4e7d18b7bd5ff2cdeb9c68

    • SHA512

      bbe46d0e3808e3914793b969f4c9a92abafd3afb4cff5bc90ba9ea0a9ca3a07c15d6a3baf661c5b60a947efb1b1ae4c8edab3a9ed95522053a9d54d3bdccb5c4

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks