General

  • Target

    23e2997ec02160eae8f64c1a8a50bda5.exe

  • Size

    153KB

  • Sample

    210721-a8dk165wdj

  • MD5

    23e2997ec02160eae8f64c1a8a50bda5

  • SHA1

    9afa53cbb9b8b9855a615fe4c96e7a936398fb55

  • SHA256

    336f9668baec97cabdf9bbcef93c92242f3614f52b21baa9c36971fe489ad828

  • SHA512

    af5e16c0ee4851ba31c47b8485c0b3486aec25f5f213467374e9bd56d086f5ae4a75d86fc85962c10c52b3938e0a665a6ae4208814eb10aae5fe362b071d60c1

Malware Config

Targets

    • Target

      23e2997ec02160eae8f64c1a8a50bda5.exe

    • Size

      153KB

    • MD5

      23e2997ec02160eae8f64c1a8a50bda5

    • SHA1

      9afa53cbb9b8b9855a615fe4c96e7a936398fb55

    • SHA256

      336f9668baec97cabdf9bbcef93c92242f3614f52b21baa9c36971fe489ad828

    • SHA512

      af5e16c0ee4851ba31c47b8485c0b3486aec25f5f213467374e9bd56d086f5ae4a75d86fc85962c10c52b3938e0a665a6ae4208814eb10aae5fe362b071d60c1

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v6

Tasks