General

  • Target

    file.exe

  • Size

    417KB

  • Sample

    230206-v4ahcsac7z

  • MD5

    17392964fd0358aacf9513de91ca9859

  • SHA1

    d8bc4f46d7368d8a70232f9a501da0de3ae15b2c

  • SHA256

    a1c82b0eab7584d687dd7b8064e5a37609d0b3bbcb2133b8d13733bb72cefd29

  • SHA512

    7ff1ee7c8afa54ca24c3570141cd3442d96b7905f494ad6579a5378fa2be9001d1824e4d7721d1ec228001935e278906cb6e435a7b5f76f882d3d21e932b3e27

  • SSDEEP

    12288:3RiP7oE43Y6Cms3T8Q8OJWNYcLaljG1a:3+kDY6Cms3YTOJWRLaljG1

Malware Config

Targets

    • Target

      file.exe

    • Size

      417KB

    • MD5

      17392964fd0358aacf9513de91ca9859

    • SHA1

      d8bc4f46d7368d8a70232f9a501da0de3ae15b2c

    • SHA256

      a1c82b0eab7584d687dd7b8064e5a37609d0b3bbcb2133b8d13733bb72cefd29

    • SHA512

      7ff1ee7c8afa54ca24c3570141cd3442d96b7905f494ad6579a5378fa2be9001d1824e4d7721d1ec228001935e278906cb6e435a7b5f76f882d3d21e932b3e27

    • SSDEEP

      12288:3RiP7oE43Y6Cms3T8Q8OJWNYcLaljG1a:3+kDY6Cms3YTOJWRLaljG1

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Tasks