General

  • Target

    1eb8e4022526af6d307c7c1d569dea4fa1db5554278b97460c95e6aa427c9b0b

  • Size

    497KB

  • Sample

    231023-n6vgzsac75

  • MD5

    6d2d381ba4e5d3486f43c3d793e8940e

  • SHA1

    2a41a03ad901e8aee3b5d9921f470ef1d876f3e2

  • SHA256

    1eb8e4022526af6d307c7c1d569dea4fa1db5554278b97460c95e6aa427c9b0b

  • SHA512

    cfbfc138980ca92a1f25fafc671ca13df633f212684a03e0affebff355072d30b484f853f112ec95e0138b9853d1271c9c39ec3fb6c9cfbb62eb3d6330d9711c

  • SSDEEP

    6144:WnbQrk12fsl2/vpUOXia60CoOO5R2ZnxQdLTJFb246eQB8ApxQNh:2bQ8MsuvpUOXia60C3O5R2sdLu4uBPSL

Malware Config

Targets

    • Target

      1eb8e4022526af6d307c7c1d569dea4fa1db5554278b97460c95e6aa427c9b0b

    • Size

      497KB

    • MD5

      6d2d381ba4e5d3486f43c3d793e8940e

    • SHA1

      2a41a03ad901e8aee3b5d9921f470ef1d876f3e2

    • SHA256

      1eb8e4022526af6d307c7c1d569dea4fa1db5554278b97460c95e6aa427c9b0b

    • SHA512

      cfbfc138980ca92a1f25fafc671ca13df633f212684a03e0affebff355072d30b484f853f112ec95e0138b9853d1271c9c39ec3fb6c9cfbb62eb3d6330d9711c

    • SSDEEP

      6144:WnbQrk12fsl2/vpUOXia60CoOO5R2ZnxQdLTJFb246eQB8ApxQNh:2bQ8MsuvpUOXia60C3O5R2sdLu4uBPSL

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks