General

  • Target

    RegHost.exe

  • Size

    8.0MB

  • Sample

    220112-lxdrrscbb8

  • MD5

    684cc15550d6217674fb9500251d76d2

  • SHA1

    a80a58f0023a0ad3fb903f7d35fb7e3b40051dc0

  • SHA256

    22acc4996289a6ab4c1334b367582149195b8465356cedede57ea2b6dc3769fc

  • SHA512

    cd3a7be058baf0312956a29688a8e372f91f83358fd4d4255b31f65bacf5eb1e4f46f8b353f73be3d48e6198bcc0f46baf59297472137674a97893b29a110cb8

Malware Config

Targets

    • Target

      RegHost.exe

    • Size

      8.0MB

    • MD5

      684cc15550d6217674fb9500251d76d2

    • SHA1

      a80a58f0023a0ad3fb903f7d35fb7e3b40051dc0

    • SHA256

      22acc4996289a6ab4c1334b367582149195b8465356cedede57ea2b6dc3769fc

    • SHA512

      cd3a7be058baf0312956a29688a8e372f91f83358fd4d4255b31f65bacf5eb1e4f46f8b353f73be3d48e6198bcc0f46baf59297472137674a97893b29a110cb8

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • TelegramRat

      Telegram_rat.

    • evasion

      evasion.

    • rl_trojan

      redline stealer.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Tasks