General

  • Target

    Installer.exe.bin

  • Size

    69.1MB

  • Sample

    230430-176ymafh5t

  • MD5

    8c9150f259858899683e9c4f5f701c53

  • SHA1

    8a61d5c6b0cb18a416bbce0503b165ba18cb4d1b

  • SHA256

    61629c02d830757dc3807148c6cb2c3a3c3bff013d55ad9118981adbf0040067

  • SHA512

    f80445e601677d14a44fa2146e2872c9cdefc569545d7c108a5bc41041c8acd9943c0845e526d288a14d04ae2cf7bbd79b65ed1e5a1de12a4e4baf3c7651a150

  • SSDEEP

    1572864:CjddGvFQodkvBVTJBthhAQaRAVvhHUzqkbeIq6o3LuhFCym0Lk:+GvFQKmHHzmQ++Z8qkbeIqz3LuDLk

Malware Config

Targets

    • Target

      Installer.exe.bin

    • Size

      69.1MB

    • MD5

      8c9150f259858899683e9c4f5f701c53

    • SHA1

      8a61d5c6b0cb18a416bbce0503b165ba18cb4d1b

    • SHA256

      61629c02d830757dc3807148c6cb2c3a3c3bff013d55ad9118981adbf0040067

    • SHA512

      f80445e601677d14a44fa2146e2872c9cdefc569545d7c108a5bc41041c8acd9943c0845e526d288a14d04ae2cf7bbd79b65ed1e5a1de12a4e4baf3c7651a150

    • SSDEEP

      1572864:CjddGvFQodkvBVTJBthhAQaRAVvhHUzqkbeIq6o3LuhFCym0Lk:+GvFQKmHHzmQ++Z8qkbeIqz3LuDLk

    • Detects Redline Stealer samples

      This rule detects the presence of Redline Stealer samples based on their unique strings.

    • Lumma Stealer

      An infostealer written in C++ first seen in August 2022.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks