General

  • Target

    6001765828ad44213832ba7b000e05a4eaa199ccc4406211bd3254ee37198db1

  • Size

    778KB

  • Sample

    220415-a78jcaacf7

  • MD5

    687c3434460c67dd5e2ff065b3861104

  • SHA1

    662479ca2b8f7f57e08cbb9c58bda2f81285c3e7

  • SHA256

    6001765828ad44213832ba7b000e05a4eaa199ccc4406211bd3254ee37198db1

  • SHA512

    798fc8a7eb6ac5e18369edfd20cfac48b6776cf5c8eb36cdbf3e90ae2cc6a64080a59b25d86820361373677d3e26a6bf21e1c5b0058b372ff7d1eda0524cd534

Malware Config

Targets

    • Target

      6001765828ad44213832ba7b000e05a4eaa199ccc4406211bd3254ee37198db1

    • Size

      778KB

    • MD5

      687c3434460c67dd5e2ff065b3861104

    • SHA1

      662479ca2b8f7f57e08cbb9c58bda2f81285c3e7

    • SHA256

      6001765828ad44213832ba7b000e05a4eaa199ccc4406211bd3254ee37198db1

    • SHA512

      798fc8a7eb6ac5e18369edfd20cfac48b6776cf5c8eb36cdbf3e90ae2cc6a64080a59b25d86820361373677d3e26a6bf21e1c5b0058b372ff7d1eda0524cd534

    • Meta Stealer Stealer

      Meta Stealer steals passwords stored in browsers, written in C++.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks