General

  • Target

    86a47d2dd08038a69db2af9c68d9fb144a8a240e9b20ab301fcea069bdfa6ec9

  • Size

    706KB

  • Sample

    211024-2fcfdafch4

  • MD5

    13acea2bcc2b85380151fcf8a8291455

  • SHA1

    23c79dd7e436e008955338077d21850621702c10

  • SHA256

    86a47d2dd08038a69db2af9c68d9fb144a8a240e9b20ab301fcea069bdfa6ec9

  • SHA512

    7118fdd3fcff46223c185aa820c88d1c49fe831bddb0fee8960f590432023693241ad51cf361ec21ed0e81e5754ea754efc5938d60d030531e1f9178d03ed965

Malware Config

Targets

    • Target

      86a47d2dd08038a69db2af9c68d9fb144a8a240e9b20ab301fcea069bdfa6ec9

    • Size

      706KB

    • MD5

      13acea2bcc2b85380151fcf8a8291455

    • SHA1

      23c79dd7e436e008955338077d21850621702c10

    • SHA256

      86a47d2dd08038a69db2af9c68d9fb144a8a240e9b20ab301fcea069bdfa6ec9

    • SHA512

      7118fdd3fcff46223c185aa820c88d1c49fe831bddb0fee8960f590432023693241ad51cf361ec21ed0e81e5754ea754efc5938d60d030531e1f9178d03ed965

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v6

Tasks