General

  • Target

    d1d898eb9f5f3ec89ee72209a95d9d8204beddbe26886bbfbe306c53ba08b83e

  • Size

    705KB

  • Sample

    211025-a5daesfde9

  • MD5

    86af5af8529d3b9c76cdc76f6962f849

  • SHA1

    9ba293fed7868e48ecfa6c8b4e0ab14c2630a98e

  • SHA256

    d1d898eb9f5f3ec89ee72209a95d9d8204beddbe26886bbfbe306c53ba08b83e

  • SHA512

    a7a78f3df79b9f703d2e6bae988781f4d4a097cb8cdf16c68272a603e107d2d7bd5ab975b44116f54c84692ba41b4dbd51b99caa1b47db9ba5c7fd15e1cd449e

Malware Config

Targets

    • Target

      d1d898eb9f5f3ec89ee72209a95d9d8204beddbe26886bbfbe306c53ba08b83e

    • Size

      705KB

    • MD5

      86af5af8529d3b9c76cdc76f6962f849

    • SHA1

      9ba293fed7868e48ecfa6c8b4e0ab14c2630a98e

    • SHA256

      d1d898eb9f5f3ec89ee72209a95d9d8204beddbe26886bbfbe306c53ba08b83e

    • SHA512

      a7a78f3df79b9f703d2e6bae988781f4d4a097cb8cdf16c68272a603e107d2d7bd5ab975b44116f54c84692ba41b4dbd51b99caa1b47db9ba5c7fd15e1cd449e

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v6

Tasks