General

  • Target

    7c625da2f60db2b8dadb24efb71739566e102b158d003d3c72ebd4ead308143a

  • Size

    436KB

  • Sample

    231022-192rpada6v

  • MD5

    86c70282dba618f0926a6374b27b8485

  • SHA1

    b16cbd990cab8e29c1c0e7c6638cc2dd3c41f631

  • SHA256

    7c625da2f60db2b8dadb24efb71739566e102b158d003d3c72ebd4ead308143a

  • SHA512

    cc8482f6f93e5eb5d3af3ceb8777acbd5bafb1f064e89064ccd42375a80ed71430f01ebff5aa24bf07b3c494d70d42b352e194222e55ac03c5788fefdf4ead6d

  • SSDEEP

    6144:oNgmkt2MotFfIv653uj51eSN1ElLmAoH7t4GzQ2o/O0BDO4RNvCU9q:oNgUFwSQPpGtnNvCU9q

Malware Config

Targets

    • Target

      7c625da2f60db2b8dadb24efb71739566e102b158d003d3c72ebd4ead308143a

    • Size

      436KB

    • MD5

      86c70282dba618f0926a6374b27b8485

    • SHA1

      b16cbd990cab8e29c1c0e7c6638cc2dd3c41f631

    • SHA256

      7c625da2f60db2b8dadb24efb71739566e102b158d003d3c72ebd4ead308143a

    • SHA512

      cc8482f6f93e5eb5d3af3ceb8777acbd5bafb1f064e89064ccd42375a80ed71430f01ebff5aa24bf07b3c494d70d42b352e194222e55ac03c5788fefdf4ead6d

    • SSDEEP

      6144:oNgmkt2MotFfIv653uj51eSN1ElLmAoH7t4GzQ2o/O0BDO4RNvCU9q:oNgUFwSQPpGtnNvCU9q

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks