General

  • Target

    ae4ac666d4c6073f23e078629ee01bba.exe

  • Size

    400KB

  • Sample

    210310-p8pk34py8n

  • MD5

    ae4ac666d4c6073f23e078629ee01bba

  • SHA1

    606a6e995b3754ff1494730242cf9fdf65936740

  • SHA256

    5d63d1c4eb964d27d53d83b399b38ffad6609b204b8741e5626d4427cc7421af

  • SHA512

    19d566f149b780dbd37aaa1ae1d72572bfb078da9f320c6fca04d0ea85b97431263104720910972d332ca94cb2801eef323388ad6a8e76c34d85336ec13426ef

Malware Config

Targets

    • Target

      ae4ac666d4c6073f23e078629ee01bba.exe

    • Size

      400KB

    • MD5

      ae4ac666d4c6073f23e078629ee01bba

    • SHA1

      606a6e995b3754ff1494730242cf9fdf65936740

    • SHA256

      5d63d1c4eb964d27d53d83b399b38ffad6609b204b8741e5626d4427cc7421af

    • SHA512

      19d566f149b780dbd37aaa1ae1d72572bfb078da9f320c6fca04d0ea85b97431263104720910972d332ca94cb2801eef323388ad6a8e76c34d85336ec13426ef

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Tasks