General

  • Target

    26a8200a6884f82e07b85f103467ee3d72854c14655af3bba15e7905103dc078

  • Size

    308KB

  • Sample

    230505-wvn5tscc49

  • MD5

    e5ccca4856f60651c62e9b9db3ac7a82

  • SHA1

    caf5368ae43b366b31036c4270a88d56ba8231b6

  • SHA256

    26a8200a6884f82e07b85f103467ee3d72854c14655af3bba15e7905103dc078

  • SHA512

    432fda43f2e936adf9aa5781747eb756a82665bc3fcdf77f511a60c4d25da3e71550b486a600d2fa60e43642f9bb957375a4bba29db0f6c24357a0f6fda3bc9f

  • SSDEEP

    6144:K1y+bnr+/p0yN90QEYlEY+zbPsR4JDFR7wCv7TJbOLuUXEe:nMrby90Gb+zKeYwJbOae

Malware Config

Targets

    • Target

      26a8200a6884f82e07b85f103467ee3d72854c14655af3bba15e7905103dc078

    • Size

      308KB

    • MD5

      e5ccca4856f60651c62e9b9db3ac7a82

    • SHA1

      caf5368ae43b366b31036c4270a88d56ba8231b6

    • SHA256

      26a8200a6884f82e07b85f103467ee3d72854c14655af3bba15e7905103dc078

    • SHA512

      432fda43f2e936adf9aa5781747eb756a82665bc3fcdf77f511a60c4d25da3e71550b486a600d2fa60e43642f9bb957375a4bba29db0f6c24357a0f6fda3bc9f

    • SSDEEP

      6144:K1y+bnr+/p0yN90QEYlEY+zbPsR4JDFR7wCv7TJbOLuUXEe:nMrby90Gb+zKeYwJbOae

    • Detects Redline Stealer samples

      This rule detects the presence of Redline Stealer samples based on their unique strings.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks