General

  • Target

    35968aadf68d8058219fea9aa038ae2b0df8466aeaa1ed970b2488300444caca

  • Size

    442KB

  • Sample

    211023-gqem9sdahq

  • MD5

    318aee78bb102ccdfd53ab9174cf8da7

  • SHA1

    743a858f375946b8929d2be5bfe6ea8316c1f9fd

  • SHA256

    35968aadf68d8058219fea9aa038ae2b0df8466aeaa1ed970b2488300444caca

  • SHA512

    6be1e9bf17ac305951abb8896d4464c255fe47c381f92ab615b34bef0e01e5c920d0f9c401285e4f0c61640be840b947d230d2706b5eed20c0a3e4455bb35fd1

Malware Config

Targets

    • Target

      35968aadf68d8058219fea9aa038ae2b0df8466aeaa1ed970b2488300444caca

    • Size

      442KB

    • MD5

      318aee78bb102ccdfd53ab9174cf8da7

    • SHA1

      743a858f375946b8929d2be5bfe6ea8316c1f9fd

    • SHA256

      35968aadf68d8058219fea9aa038ae2b0df8466aeaa1ed970b2488300444caca

    • SHA512

      6be1e9bf17ac305951abb8896d4464c255fe47c381f92ab615b34bef0e01e5c920d0f9c401285e4f0c61640be840b947d230d2706b5eed20c0a3e4455bb35fd1

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks