General

  • Target

    341d379b7c8ff365eafcf79d31056edb.exe

  • Size

    651KB

  • Sample

    210225-gj48kqth9j

  • MD5

    341d379b7c8ff365eafcf79d31056edb

  • SHA1

    81eac8a9f7dd36790cbe6740d21b57a75cdfdf45

  • SHA256

    411c2e9854cd5405b206312a9645021c81b8ae0d1ed8c2752e67b17fd075a4d1

  • SHA512

    0e635cf196eb7f966c4698064754a444563c9629de36e438f79edc5691645643da135560b9732d2b4ccdcc8fb926b1ecb541bfc1bdc3d451a69549ba450f3df9

Malware Config

Targets

    • Target

      341d379b7c8ff365eafcf79d31056edb.exe

    • Size

      651KB

    • MD5

      341d379b7c8ff365eafcf79d31056edb

    • SHA1

      81eac8a9f7dd36790cbe6740d21b57a75cdfdf45

    • SHA256

      411c2e9854cd5405b206312a9645021c81b8ae0d1ed8c2752e67b17fd075a4d1

    • SHA512

      0e635cf196eb7f966c4698064754a444563c9629de36e438f79edc5691645643da135560b9732d2b4ccdcc8fb926b1ecb541bfc1bdc3d451a69549ba450f3df9

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Tasks