General

  • Target

    7c7bbf7e94bf31db432ef74fd73a6c82.exe

  • Size

    654KB

  • Sample

    210222-c9vxw1rl4e

  • MD5

    7c7bbf7e94bf31db432ef74fd73a6c82

  • SHA1

    21cf96ab02b054939abba6660214a7c82a373322

  • SHA256

    6846c70c5392556654844ce2e05e68f248432176c88d2b92f44b1b487c6b7db3

  • SHA512

    3ce1568469d03dd34e02b16bdf8a60fcecee4de483a01bb1accecd37bb6d9f84a5bbaa0e390f8fa085eff28ff99d4073c462fa0a0ce522ff14e5e1c851b74b70

Malware Config

Targets

    • Target

      7c7bbf7e94bf31db432ef74fd73a6c82.exe

    • Size

      654KB

    • MD5

      7c7bbf7e94bf31db432ef74fd73a6c82

    • SHA1

      21cf96ab02b054939abba6660214a7c82a373322

    • SHA256

      6846c70c5392556654844ce2e05e68f248432176c88d2b92f44b1b487c6b7db3

    • SHA512

      3ce1568469d03dd34e02b16bdf8a60fcecee4de483a01bb1accecd37bb6d9f84a5bbaa0e390f8fa085eff28ff99d4073c462fa0a0ce522ff14e5e1c851b74b70

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Tasks