General

  • Target

    0805245691bdbc9bb428f080a334f33e53a1c960b4b1bbf79142deaaf5945b61

  • Size

    407KB

  • Sample

    211024-kz6d5adeg4

  • MD5

    44f21c76097a8025fb92fee3f45c95e1

  • SHA1

    4749bf96b319ce94efed249c33235deb23707d2c

  • SHA256

    0805245691bdbc9bb428f080a334f33e53a1c960b4b1bbf79142deaaf5945b61

  • SHA512

    50ad7ac6811bee5fdac78898b0b293b941fd95327c180439672bffed8ee9f96d8b4b7aaac9bc58723968f3e8ec13a612705f8cdf1b1eaacd74be200795c15546

Malware Config

Targets

    • Target

      0805245691bdbc9bb428f080a334f33e53a1c960b4b1bbf79142deaaf5945b61

    • Size

      407KB

    • MD5

      44f21c76097a8025fb92fee3f45c95e1

    • SHA1

      4749bf96b319ce94efed249c33235deb23707d2c

    • SHA256

      0805245691bdbc9bb428f080a334f33e53a1c960b4b1bbf79142deaaf5945b61

    • SHA512

      50ad7ac6811bee5fdac78898b0b293b941fd95327c180439672bffed8ee9f96d8b4b7aaac9bc58723968f3e8ec13a612705f8cdf1b1eaacd74be200795c15546

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks