General

  • Target

    c5aac20d1151d45394be38c097239e68b9e8ff62cef7cc87f1500c51e34114bb

  • Size

    380KB

  • Sample

    230313-gghnkaag8x

  • MD5

    be40e146f0b25d468736127c894d8c26

  • SHA1

    ef5249a8f51597d6a0748c10305b42529029e771

  • SHA256

    c5aac20d1151d45394be38c097239e68b9e8ff62cef7cc87f1500c51e34114bb

  • SHA512

    144f1912a18d316a06d04d1d9b9276b2100b8b4156d6ca6744ef08da346e5ff6e752845b3a9386efc2c49768fa04b6e190da556382aa6bd6eb59f6a1766818e1

  • SSDEEP

    6144:RELJntEkCMwKilfPF9gzgz4UB+FNLIoOjQT:RElnKXbHF9yWB+HUo8A

Malware Config

Targets

    • Target

      c5aac20d1151d45394be38c097239e68b9e8ff62cef7cc87f1500c51e34114bb

    • Size

      380KB

    • MD5

      be40e146f0b25d468736127c894d8c26

    • SHA1

      ef5249a8f51597d6a0748c10305b42529029e771

    • SHA256

      c5aac20d1151d45394be38c097239e68b9e8ff62cef7cc87f1500c51e34114bb

    • SHA512

      144f1912a18d316a06d04d1d9b9276b2100b8b4156d6ca6744ef08da346e5ff6e752845b3a9386efc2c49768fa04b6e190da556382aa6bd6eb59f6a1766818e1

    • SSDEEP

      6144:RELJntEkCMwKilfPF9gzgz4UB+FNLIoOjQT:RElnKXbHF9yWB+HUo8A

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks