General

  • Target

    RedLineStealer.zip

  • Size

    230KB

  • Sample

    230311-m66dtahc65

  • MD5

    bf842df0b4794fb0998285711cd1fe7b

  • SHA1

    b5201e51e4650c9dfa3c118865324961cf1315af

  • SHA256

    9eaddf379c9ad39ad6d9d98ae868a297e21dfae4b64f1664b209eb2d0c9950d4

  • SHA512

    e758ed0d818be681a27988214157d9a5cd7359132a144d0441bffe4761ff34aa7f5ab7ae3b9ea51316483b8977fc408e2a76b62ebfa67c456a82835ce2d7ef0c

  • SSDEEP

    6144:6YjgJafqRFYZYg3uVR+KXuEM29nZWEvizVOI/d0+wTn3+Ln:XjgJt0Y9r+KXBFHax/C+wTuLn

Malware Config

Targets

    • Target

      d1546fedbf01d0a5a416ab282d652ba6dd4c35c69aaa8ffe00638eb636408e2a.exe

    • Size

      286KB

    • MD5

      82ca8eadd52b5731b10b991c4e7d4204

    • SHA1

      ccb3179c3118ac4526ba958e322d7d7a8335a539

    • SHA256

      d1546fedbf01d0a5a416ab282d652ba6dd4c35c69aaa8ffe00638eb636408e2a

    • SHA512

      16482704deb85a321ba4c0d17c28ee3d3439b2e520c6ed6b557f50fc683ae4ed36990c461aa187d36ab37b2f8b3b2a8961f56e335d63f7c9323cfdbff8a807b4

    • SSDEEP

      6144:x3XGvec0WIVf+A9AUWlmfGwWcbB/QhzWTbvWZCC0K:xHKec0WkbXWYNb+zWTSn

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks