General

  • Target

    ba5e9d2e62f5e1ed6198f7f80f28862d.bin

  • Size

    218KB

  • Sample

    231101-cjr8kaba52

  • MD5

    f4566589332fb159378bc2a8803a17ab

  • SHA1

    cd832866e342e6ab411c2135ae5d217bc22e5f29

  • SHA256

    0783485e4d23d233e53cc397232cd347c5cdf76ee27cd118c605829a4a7bc206

  • SHA512

    8e847ed8a642263ffccac716f95582373ae07a83339029b3786e5aa7eb426ab33d7f2249717adaeeb036992e52e7ca71f30a61c33a50c979cc58b6660cbed389

  • SSDEEP

    6144:hkxbUITFbt/+BQPfbJgZPUB22v3yoPFEnyUlwCaju:hkxbUIpbZ+B4JgZPFo7PFMyU+CaC

Malware Config

Targets

    • Target

      7ffa3cf71ff6e8aec4029586dcca55a61edcd799212eb14b7a18073fea4e8c5d.exe

    • Size

      501KB

    • MD5

      ba5e9d2e62f5e1ed6198f7f80f28862d

    • SHA1

      36fb5e81eb10c141dee03703bb27cf3b63a6193a

    • SHA256

      7ffa3cf71ff6e8aec4029586dcca55a61edcd799212eb14b7a18073fea4e8c5d

    • SHA512

      6faacd60e54642b5444b712db7534be1886e9347a9e151264475e72abf17eede931c3f1b8d171d5ef2903c5aa98af7321f4a6721d053f8bee02790ebc9b79b65

    • SSDEEP

      12288:F01DoqN4lVVE6nZH4zVAlFTO2uONvnoYZvcL:Fo43VErOBDnoYZvcL

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Detected potential entity reuse from brand microsoft.

MITRE ATT&CK Enterprise v15

Tasks