General

  • Target

    f796e0112f3ef2c251ec826fb3df19ef7032c22fd0f67372d16938a1cf5fce80

  • Size

    2.3MB

  • Sample

    220414-nr43waaab6

  • MD5

    c3f62c1694be2f1450a623e719a87966

  • SHA1

    68cfd90ae31b1aaec70c484c12e720142113d3d6

  • SHA256

    f796e0112f3ef2c251ec826fb3df19ef7032c22fd0f67372d16938a1cf5fce80

  • SHA512

    d8b5e409ef5088996ea74e79a86be46896e89e7bd8091d65d7acdfcb9050937ac989f032167276d1fb1f65a6e62b3852e7eff6161ca5ad1258c331fc91b18597

Malware Config

Targets

    • Target

      f796e0112f3ef2c251ec826fb3df19ef7032c22fd0f67372d16938a1cf5fce80

    • Size

      2.3MB

    • MD5

      c3f62c1694be2f1450a623e719a87966

    • SHA1

      68cfd90ae31b1aaec70c484c12e720142113d3d6

    • SHA256

      f796e0112f3ef2c251ec826fb3df19ef7032c22fd0f67372d16938a1cf5fce80

    • SHA512

      d8b5e409ef5088996ea74e79a86be46896e89e7bd8091d65d7acdfcb9050937ac989f032167276d1fb1f65a6e62b3852e7eff6161ca5ad1258c331fc91b18597

    • Meta Stealer Stealer

      Meta Stealer steals passwords stored in browsers, written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks