General

  • Target

    RedEngine.exe

  • Size

    13.3MB

  • Sample

    231128-yg8nescd44

  • MD5

    d4fcfca5ccb9392799fa8d81567307a1

  • SHA1

    fa5345977385325ae6f58879229504f47fcc0c7b

  • SHA256

    714d17f082203236c5c1ab7e65bec424102b67507f29b28623eaf7f63d5a014e

  • SHA512

    4a9922a4311de9dc79764c9e1bbbc847050d6b72015788d5645802567b1dc168981e1d202c6d66f370c7ae105b15020c5d285424a9cfe359dccf01b7ce6b9e9e

  • SSDEEP

    393216:r8iIE7Yo9+4usnwW+eGQRJ9jo7BGcGt1AzZFNoqN4WTr:x7r9+RowW+e5RJ9MamNWy

Malware Config

Targets

    • Target

      RedEngine.exe

    • Size

      13.3MB

    • MD5

      d4fcfca5ccb9392799fa8d81567307a1

    • SHA1

      fa5345977385325ae6f58879229504f47fcc0c7b

    • SHA256

      714d17f082203236c5c1ab7e65bec424102b67507f29b28623eaf7f63d5a014e

    • SHA512

      4a9922a4311de9dc79764c9e1bbbc847050d6b72015788d5645802567b1dc168981e1d202c6d66f370c7ae105b15020c5d285424a9cfe359dccf01b7ce6b9e9e

    • SSDEEP

      393216:r8iIE7Yo9+4usnwW+eGQRJ9jo7BGcGt1AzZFNoqN4WTr:x7r9+RowW+e5RJ9MamNWy

    Score
    7/10
    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks