General

  • Target

    352ec1261178252b95d1d66145487203.exe

  • Size

    214KB

  • Sample

    210721-stcl4lkgfx

  • MD5

    352ec1261178252b95d1d66145487203

  • SHA1

    9d67151f841b85b410e7876db438c727076e5db1

  • SHA256

    c7399bc053ff61efe781e386a4c1fb2044307eb60bd28548477eadbb1e62c043

  • SHA512

    6a326ecdf564c8ba55976a910d76a4615ef4ee813c89ca3d1d463549d2753eb4b33d5165cd81d0d5e03c89342acaf20dff921e410471c6e8b2b1cb40b70fda59

Malware Config

Targets

    • Target

      352ec1261178252b95d1d66145487203.exe

    • Size

      214KB

    • MD5

      352ec1261178252b95d1d66145487203

    • SHA1

      9d67151f841b85b410e7876db438c727076e5db1

    • SHA256

      c7399bc053ff61efe781e386a4c1fb2044307eb60bd28548477eadbb1e62c043

    • SHA512

      6a326ecdf564c8ba55976a910d76a4615ef4ee813c89ca3d1d463549d2753eb4b33d5165cd81d0d5e03c89342acaf20dff921e410471c6e8b2b1cb40b70fda59

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v6

Tasks