General

  • Target

    634d7f8408d97c81dba3963924702d77.exe

  • Size

    573KB

  • Sample

    210322-rjk51kdlg6

  • MD5

    634d7f8408d97c81dba3963924702d77

  • SHA1

    35510b0a33f9d0195b7cf0fe24f1c66418766901

  • SHA256

    b64b8d6ed783256668905a1347aabd325abd166ef465509e82e7c4e8c3d00166

  • SHA512

    8f2c04249ea5b61c199f13e8dbc43be04088f5286fb8b9ecd7dece8cc195489f740b0a2f1c86440a98df417421f1d1daea55ed4294c92ed20cd2bd7fb7f8497e

Malware Config

Targets

    • Target

      634d7f8408d97c81dba3963924702d77.exe

    • Size

      573KB

    • MD5

      634d7f8408d97c81dba3963924702d77

    • SHA1

      35510b0a33f9d0195b7cf0fe24f1c66418766901

    • SHA256

      b64b8d6ed783256668905a1347aabd325abd166ef465509e82e7c4e8c3d00166

    • SHA512

      8f2c04249ea5b61c199f13e8dbc43be04088f5286fb8b9ecd7dece8cc195489f740b0a2f1c86440a98df417421f1d1daea55ed4294c92ed20cd2bd7fb7f8497e

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks