General

  • Target

    minesrunner.exe.bin

  • Size

    64.0MB

  • Sample

    230501-ykfrtagb58

  • MD5

    f934b2f949106109c2807115978f889a

  • SHA1

    24847ed82ab8d1047e8ea11dbfdb187d52ed13a8

  • SHA256

    fc85332e63607e30e7a83be0a2ccbdba4963c9eba61b1926c2beadd384d59d49

  • SHA512

    d4aea44d3410b5c1241995e65b430e8b497ce018f3f7b083826cca2eeba40289a15c06849201ef7ead314b2d8e1c9e9f5a3dbee160ee8843cb862f02f601e4bb

  • SSDEEP

    1572864:BjddrbW7aykqEeYFGGGz7PRFWTcDJGKJDh1248W:RfW5KeaGGGfjWTcwKMW

Malware Config

Targets

    • Target

      minesrunner.exe.bin

    • Size

      64.0MB

    • MD5

      f934b2f949106109c2807115978f889a

    • SHA1

      24847ed82ab8d1047e8ea11dbfdb187d52ed13a8

    • SHA256

      fc85332e63607e30e7a83be0a2ccbdba4963c9eba61b1926c2beadd384d59d49

    • SHA512

      d4aea44d3410b5c1241995e65b430e8b497ce018f3f7b083826cca2eeba40289a15c06849201ef7ead314b2d8e1c9e9f5a3dbee160ee8843cb862f02f601e4bb

    • SSDEEP

      1572864:BjddrbW7aykqEeYFGGGz7PRFWTcDJGKJDh1248W:RfW5KeaGGGfjWTcwKMW

    • Detects Redline Stealer samples

      This rule detects the presence of Redline Stealer samples based on their unique strings.

    • Lumma Stealer

      An infostealer written in C++ first seen in August 2022.

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks