General

  • Target

    SecuriteInfo.com.Trojan.GenericKD.45853323.31157.31821

  • Size

    903KB

  • Sample

    210307-fhk16dylkn

  • MD5

    7f8a15aca0965d3ef7f5e36245ee20fa

  • SHA1

    0e476fde9eb2f99c36af59833f93fafe5d5ad291

  • SHA256

    4fc6b82cb39e7ba08b5c9d519bf11111e76d3313f0e2bd93c3b67d15b155c2e7

  • SHA512

    3b1a0e0f8aca55d80b6a8578db6d43603f0e98e45b5e5f64675fe23a7ec5cf956518e5d86a20d3aa859275e4e631002f1ff87a6445283649eda79c2736dabd01

Malware Config

Targets

    • Target

      SecuriteInfo.com.Trojan.GenericKD.45853323.31157.31821

    • Size

      903KB

    • MD5

      7f8a15aca0965d3ef7f5e36245ee20fa

    • SHA1

      0e476fde9eb2f99c36af59833f93fafe5d5ad291

    • SHA256

      4fc6b82cb39e7ba08b5c9d519bf11111e76d3313f0e2bd93c3b67d15b155c2e7

    • SHA512

      3b1a0e0f8aca55d80b6a8578db6d43603f0e98e45b5e5f64675fe23a7ec5cf956518e5d86a20d3aa859275e4e631002f1ff87a6445283649eda79c2736dabd01

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Obfuscated with Agile.Net obfuscator

      Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Tasks