General

  • Target

    22930bdbe1a579ae17c1f1563556acc7

  • Size

    623KB

  • Sample

    220129-ynph5ahcb6

  • MD5

    22930bdbe1a579ae17c1f1563556acc7

  • SHA1

    ea9b9bd8e6b858ba7c36263b5a9eee4ce18b53e7

  • SHA256

    963c04618351dd9deec457067f8c8b0857e85e106f5b8bd9c9d33b42c8e9e154

  • SHA512

    aab60c1dbeced8487faf5d0b5864b185f956225a23cfab1336bb4344ccc09d6678a03f91d69167f26e0f807154e86a6d1dd8ed8ede4512a02172a0a0d601f949

Malware Config

Targets

    • Target

      22930bdbe1a579ae17c1f1563556acc7

    • Size

      623KB

    • MD5

      22930bdbe1a579ae17c1f1563556acc7

    • SHA1

      ea9b9bd8e6b858ba7c36263b5a9eee4ce18b53e7

    • SHA256

      963c04618351dd9deec457067f8c8b0857e85e106f5b8bd9c9d33b42c8e9e154

    • SHA512

      aab60c1dbeced8487faf5d0b5864b185f956225a23cfab1336bb4344ccc09d6678a03f91d69167f26e0f807154e86a6d1dd8ed8ede4512a02172a0a0d601f949

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks