General

  • Target

    e1f326a844d8cbf984d65dcd64ba352b47c299adea040e96b6c769b245e4c7a8

  • Size

    802KB

  • Sample

    231023-fmr9hsgb93

  • MD5

    c0fcdf0a51edf251e02e26d21ea597a8

  • SHA1

    689d4859c73589ea23ba7b99ced7a80af7768dd7

  • SHA256

    e1f326a844d8cbf984d65dcd64ba352b47c299adea040e96b6c769b245e4c7a8

  • SHA512

    d8b4a971679d6f19e5beab30ac28609e376dfb63ff3b30df1e0b2db03cd004216f784e4b9629be9ff74c6104f2595a6073fbfbdfb8cc95e97fb4c5d6bf7861ca

  • SSDEEP

    12288:Nwx/RZvIJTwXdFrsuajSg7dM7isIm1tX1j67KfgeRrnsrfgeRrnsx:S/cJTQdRiDZ2fx1jcKYUsrYUsx

Malware Config

Targets

    • Target

      e1f326a844d8cbf984d65dcd64ba352b47c299adea040e96b6c769b245e4c7a8

    • Size

      802KB

    • MD5

      c0fcdf0a51edf251e02e26d21ea597a8

    • SHA1

      689d4859c73589ea23ba7b99ced7a80af7768dd7

    • SHA256

      e1f326a844d8cbf984d65dcd64ba352b47c299adea040e96b6c769b245e4c7a8

    • SHA512

      d8b4a971679d6f19e5beab30ac28609e376dfb63ff3b30df1e0b2db03cd004216f784e4b9629be9ff74c6104f2595a6073fbfbdfb8cc95e97fb4c5d6bf7861ca

    • SSDEEP

      12288:Nwx/RZvIJTwXdFrsuajSg7dM7isIm1tX1j67KfgeRrnsrfgeRrnsx:S/cJTQdRiDZ2fx1jcKYUsrYUsx

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks