General

  • Target

    OneTapV4.exe

  • Size

    831KB

  • Sample

    210224-y8zzjjzsax

  • MD5

    51e9c5a0bcf4e9e1e9f33bd91b3e50f2

  • SHA1

    f6fd583d071cf8167fc065fbddbb89c92d18f4cf

  • SHA256

    75ae1751515b48d24859c91fd08bd0595d84decb06566c1d3eec6363b0be9d82

  • SHA512

    4ace76f28cdd99eded87003fe7d3d2a89f1e0f0862f8fb00fd7132c4092c7813ba154a726736881b36e8911b9957f50c9f35f8305970d956e4529092394163e9

Malware Config

Targets

    • Target

      OneTapV4.exe

    • Size

      831KB

    • MD5

      51e9c5a0bcf4e9e1e9f33bd91b3e50f2

    • SHA1

      f6fd583d071cf8167fc065fbddbb89c92d18f4cf

    • SHA256

      75ae1751515b48d24859c91fd08bd0595d84decb06566c1d3eec6363b0be9d82

    • SHA512

      4ace76f28cdd99eded87003fe7d3d2a89f1e0f0862f8fb00fd7132c4092c7813ba154a726736881b36e8911b9957f50c9f35f8305970d956e4529092394163e9

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Tasks