General

  • Target

    55fbfaaeee07219fa0c1854b2d594a4b334d94fad72e84f9f4b24f367628ca6c.exe

  • Size

    310KB

  • Sample

    240310-cnmhwaab9x

  • MD5

    1f22a7e6656435da34317aa3e7a95f51

  • SHA1

    8bec84fa7a4a5e4113ea3548eb0c0d95d050f218

  • SHA256

    55fbfaaeee07219fa0c1854b2d594a4b334d94fad72e84f9f4b24f367628ca6c

  • SHA512

    a263145b00ff21ecaf04214996f1b277db13bdc5013591c3c9cf25e9082fc99bc5e357f56aba4cea4dbcc68f85262fe7bbd7f1cec93cde81c0b30dae77f1b95e

  • SSDEEP

    6144:LtaJEzrozDSV1dNaYO5/Mdk4KwqjDNgxoUb2dME:LtaJL61dN/3K1jJfU

Malware Config

Targets

    • Target

      55fbfaaeee07219fa0c1854b2d594a4b334d94fad72e84f9f4b24f367628ca6c.exe

    • Size

      310KB

    • MD5

      1f22a7e6656435da34317aa3e7a95f51

    • SHA1

      8bec84fa7a4a5e4113ea3548eb0c0d95d050f218

    • SHA256

      55fbfaaeee07219fa0c1854b2d594a4b334d94fad72e84f9f4b24f367628ca6c

    • SHA512

      a263145b00ff21ecaf04214996f1b277db13bdc5013591c3c9cf25e9082fc99bc5e357f56aba4cea4dbcc68f85262fe7bbd7f1cec93cde81c0b30dae77f1b95e

    • SSDEEP

      6144:LtaJEzrozDSV1dNaYO5/Mdk4KwqjDNgxoUb2dME:LtaJL61dN/3K1jJfU

    • Detect ZGRat V1

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • ZGRat

      ZGRat is remote access trojan written in C#.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks