General

  • Target

    SecuriteInfo.com.Trojan.GenericKD.48274970.27549.13362

  • Size

    1.8MB

  • Sample

    220206-symjmabch3

  • MD5

    8c7c8512e1de244c679575f825640f2b

  • SHA1

    f5164e0228e18a37de301eeedf6494bae72ddba5

  • SHA256

    e6496deacc785f638940cc3b3cef72bdb9ffea30624d992bbd35d29aacdcb7c2

  • SHA512

    4f1b4629c4fbcc5d795773cf3731f11a5f67af3416511c1baa38c66b3401af8bf21de33e7eb7ae01bad3c1d9777294258b91947f40267076cd8829d2ab9f68ad

Malware Config

Targets

    • Target

      SecuriteInfo.com.Trojan.GenericKD.48274970.27549.13362

    • Size

      1.8MB

    • MD5

      8c7c8512e1de244c679575f825640f2b

    • SHA1

      f5164e0228e18a37de301eeedf6494bae72ddba5

    • SHA256

      e6496deacc785f638940cc3b3cef72bdb9ffea30624d992bbd35d29aacdcb7c2

    • SHA512

      4f1b4629c4fbcc5d795773cf3731f11a5f67af3416511c1baa38c66b3401af8bf21de33e7eb7ae01bad3c1d9777294258b91947f40267076cd8829d2ab9f68ad

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks