General

  • Target

    7ca2271110ad361653cd74b6fe21e50f9fd691eaa7c1ff1d2809a04f1f4d6146

  • Size

    390KB

  • Sample

    231107-gyxttace9v

  • MD5

    ea1d68b0e54d60e71185902011a66542

  • SHA1

    2cbf69b5a8d895a9921bd6e6df5b1767ba713667

  • SHA256

    7ca2271110ad361653cd74b6fe21e50f9fd691eaa7c1ff1d2809a04f1f4d6146

  • SHA512

    286002425af0b2f4aae6047dae1adfe4fc0ec9a730e392d294f781d1e66fe5e702c47e6abe68f29ac0edc69f407e90631a67c8a0c4b4165fab3ae1aa3dc2f7e4

  • SSDEEP

    6144:Ij5o2F93z2rnTUX75zZ2OU7PBCksQNZZGq1cpF2lpO3z:uoPrcwlZxNnGq1i2lpq

Malware Config

Targets

    • Target

      7ca2271110ad361653cd74b6fe21e50f9fd691eaa7c1ff1d2809a04f1f4d6146

    • Size

      390KB

    • MD5

      ea1d68b0e54d60e71185902011a66542

    • SHA1

      2cbf69b5a8d895a9921bd6e6df5b1767ba713667

    • SHA256

      7ca2271110ad361653cd74b6fe21e50f9fd691eaa7c1ff1d2809a04f1f4d6146

    • SHA512

      286002425af0b2f4aae6047dae1adfe4fc0ec9a730e392d294f781d1e66fe5e702c47e6abe68f29ac0edc69f407e90631a67c8a0c4b4165fab3ae1aa3dc2f7e4

    • SSDEEP

      6144:Ij5o2F93z2rnTUX75zZ2OU7PBCksQNZZGq1cpF2lpO3z:uoPrcwlZxNnGq1i2lpq

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks