General

  • Target

    b82cc0f4d26e4479ee14d7d60b12a931.exe

  • Size

    530KB

  • Sample

    210219-hy41hwp34x

  • MD5

    b82cc0f4d26e4479ee14d7d60b12a931

  • SHA1

    f4dc959115dc25211b50ba39f5eee33ff79d0d51

  • SHA256

    475fb56e0d04331b71ef82cd98e61b377a8ece08a57345f18806fd367718bbc2

  • SHA512

    5b27f69e80cecce36cbad4c4889f948026cf24266497e9b79f927c912675a55ca42a6369580bf9ff67cbea6a77278ced1e0e72215a4bfda3e969bb79111a0738

Malware Config

Targets

    • Target

      b82cc0f4d26e4479ee14d7d60b12a931.exe

    • Size

      530KB

    • MD5

      b82cc0f4d26e4479ee14d7d60b12a931

    • SHA1

      f4dc959115dc25211b50ba39f5eee33ff79d0d51

    • SHA256

      475fb56e0d04331b71ef82cd98e61b377a8ece08a57345f18806fd367718bbc2

    • SHA512

      5b27f69e80cecce36cbad4c4889f948026cf24266497e9b79f927c912675a55ca42a6369580bf9ff67cbea6a77278ced1e0e72215a4bfda3e969bb79111a0738

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Tasks