General

  • Target

    13a6113875ce9745029aaf46433a25ddcb5e7aba9912be66b09e84fedb688f22

  • Size

    341KB

  • Sample

    230902-fytlqabe29

  • MD5

    d9c8bc57eff19e15e8670881fa0dcb81

  • SHA1

    f8f5a3b926bdec0be2630d83616506828934b538

  • SHA256

    13a6113875ce9745029aaf46433a25ddcb5e7aba9912be66b09e84fedb688f22

  • SHA512

    909e06d76f34ca952ccd81809ef8891e50fc7d0fc2d64419a8d75868e4a4f41f4204ada445c240d42c412e70a11b002a19a77d5e5d71812558f83cc7182def74

  • SSDEEP

    6144:XRtS5qaNkaw/Py4HqtMRda71broYkbEVz5eN1a/Ti:oqXJ64Hw1QYkbEVz5c

Malware Config

Targets

    • Target

      13a6113875ce9745029aaf46433a25ddcb5e7aba9912be66b09e84fedb688f22

    • Size

      341KB

    • MD5

      d9c8bc57eff19e15e8670881fa0dcb81

    • SHA1

      f8f5a3b926bdec0be2630d83616506828934b538

    • SHA256

      13a6113875ce9745029aaf46433a25ddcb5e7aba9912be66b09e84fedb688f22

    • SHA512

      909e06d76f34ca952ccd81809ef8891e50fc7d0fc2d64419a8d75868e4a4f41f4204ada445c240d42c412e70a11b002a19a77d5e5d71812558f83cc7182def74

    • SSDEEP

      6144:XRtS5qaNkaw/Py4HqtMRda71broYkbEVz5eN1a/Ti:oqXJ64Hw1QYkbEVz5c

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks