General

  • Target

    7ffa3cf71ff6e8aec4029586dcca55a61edcd799212eb14b7a18073fea4e8c5d

  • Size

    501KB

  • Sample

    231030-p71k3aeg92

  • MD5

    ba5e9d2e62f5e1ed6198f7f80f28862d

  • SHA1

    36fb5e81eb10c141dee03703bb27cf3b63a6193a

  • SHA256

    7ffa3cf71ff6e8aec4029586dcca55a61edcd799212eb14b7a18073fea4e8c5d

  • SHA512

    6faacd60e54642b5444b712db7534be1886e9347a9e151264475e72abf17eede931c3f1b8d171d5ef2903c5aa98af7321f4a6721d053f8bee02790ebc9b79b65

  • SSDEEP

    12288:F01DoqN4lVVE6nZH4zVAlFTO2uONvnoYZvcL:Fo43VErOBDnoYZvcL

Malware Config

Targets

    • Target

      7ffa3cf71ff6e8aec4029586dcca55a61edcd799212eb14b7a18073fea4e8c5d

    • Size

      501KB

    • MD5

      ba5e9d2e62f5e1ed6198f7f80f28862d

    • SHA1

      36fb5e81eb10c141dee03703bb27cf3b63a6193a

    • SHA256

      7ffa3cf71ff6e8aec4029586dcca55a61edcd799212eb14b7a18073fea4e8c5d

    • SHA512

      6faacd60e54642b5444b712db7534be1886e9347a9e151264475e72abf17eede931c3f1b8d171d5ef2903c5aa98af7321f4a6721d053f8bee02790ebc9b79b65

    • SSDEEP

      12288:F01DoqN4lVVE6nZH4zVAlFTO2uONvnoYZvcL:Fo43VErOBDnoYZvcL

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks