General

  • Target

    67ccd36395c427e6f5ef5a3b7e58967d

  • Size

    164KB

  • Sample

    211025-gjlg8sffb4

  • MD5

    67ccd36395c427e6f5ef5a3b7e58967d

  • SHA1

    2f67f612f17c57b40aa3c86d5b204a4736ab0fcc

  • SHA256

    90d35407fa3bb7d954c934de5e624cecca0998e9f3ed87823a9f6c127e0a3e37

  • SHA512

    d00fa491d9abf7bf4d9cf678e901ed4ceb4fd343776603f1f35842e9a856405dcdead67f95958335bad3a5f898f87d55a26f62972064e31584566731b6eb515d

Malware Config

Targets

    • Target

      67ccd36395c427e6f5ef5a3b7e58967d

    • Size

      164KB

    • MD5

      67ccd36395c427e6f5ef5a3b7e58967d

    • SHA1

      2f67f612f17c57b40aa3c86d5b204a4736ab0fcc

    • SHA256

      90d35407fa3bb7d954c934de5e624cecca0998e9f3ed87823a9f6c127e0a3e37

    • SHA512

      d00fa491d9abf7bf4d9cf678e901ed4ceb4fd343776603f1f35842e9a856405dcdead67f95958335bad3a5f898f87d55a26f62972064e31584566731b6eb515d

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks