General

  • Target

    2dd85e747e3fff1beb991efd7fe17508bdf59b7a435edb032149c582171d7a72

  • Size

    299KB

  • Sample

    230301-r74zlagb8v

  • MD5

    210f8e0f8b5fae8e56a89d2a44b7c409

  • SHA1

    8a66c6add010ca714bfa919e562158178ff721e6

  • SHA256

    2dd85e747e3fff1beb991efd7fe17508bdf59b7a435edb032149c582171d7a72

  • SHA512

    ccce29585877a3ccafd60b3cc200367e1658bf18eba03e64539f5e09f08427d1d12a0b7617e927c07f8b5125c707dc6eb73aceab0e884d403e579eff1d068617

  • SSDEEP

    6144:VcTP4Vys9AN73qXZdoxGhhxSh+vwgdFUA1smM07g2:Vcz41AN73qQkbxSUvZuH+

Malware Config

Targets

    • Target

      2dd85e747e3fff1beb991efd7fe17508bdf59b7a435edb032149c582171d7a72

    • Size

      299KB

    • MD5

      210f8e0f8b5fae8e56a89d2a44b7c409

    • SHA1

      8a66c6add010ca714bfa919e562158178ff721e6

    • SHA256

      2dd85e747e3fff1beb991efd7fe17508bdf59b7a435edb032149c582171d7a72

    • SHA512

      ccce29585877a3ccafd60b3cc200367e1658bf18eba03e64539f5e09f08427d1d12a0b7617e927c07f8b5125c707dc6eb73aceab0e884d403e579eff1d068617

    • SSDEEP

      6144:VcTP4Vys9AN73qXZdoxGhhxSh+vwgdFUA1smM07g2:Vcz41AN73qQkbxSUvZuH+

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • .NET Reactor proctector

      Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks