General

  • Target

    TBMSetup.exe

  • Size

    49.7MB

  • Sample

    230329-wktbsshc82

  • MD5

    0b9d7f87af8f634c59647aa7622aa08a

  • SHA1

    e8f6ef5cb9f7ce9e6e0b6045df84e86b618de2a0

  • SHA256

    3179ecd81c25dc7ceb0e66e0525b31826509398cf98a1302d829d1832d38dbb1

  • SHA512

    346ec51625e3562614bbc446429144d2fff7417f42440ec3708f61a226f1cfd17eee084a629225e47e942467fc61b89f1732196657b0556d2fc65ffa8bcd4d5f

  • SSDEEP

    1572864:dm8+bh8WfRD2IwYhsHT57xo8SM2+OzHI1Id7:d6SmJbZET5FzS7xo147

Malware Config

Targets

    • Target

      TBMSetup.exe

    • Size

      49.7MB

    • MD5

      0b9d7f87af8f634c59647aa7622aa08a

    • SHA1

      e8f6ef5cb9f7ce9e6e0b6045df84e86b618de2a0

    • SHA256

      3179ecd81c25dc7ceb0e66e0525b31826509398cf98a1302d829d1832d38dbb1

    • SHA512

      346ec51625e3562614bbc446429144d2fff7417f42440ec3708f61a226f1cfd17eee084a629225e47e942467fc61b89f1732196657b0556d2fc65ffa8bcd4d5f

    • SSDEEP

      1572864:dm8+bh8WfRD2IwYhsHT57xo8SM2+OzHI1Id7:d6SmJbZET5FzS7xo147

    • Detects Redline Stealer samples

      This rule detects the presence of Redline Stealer samples based on their unique strings.

    • Lumma Stealer

      An infostealer written in C++ first seen in August 2022.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

1
T1082

Process Discovery

1
T1057

Collection

Data from Local System

1
T1005

Tasks