Resubmissions

19-07-2024 12:01

240719-n61zrszekn 10

19-07-2024 11:55

240719-n3jlbashnh 10

General

  • Target

    Launcher.exe

  • Size

    74KB

  • Sample

    240719-n61zrszekn

  • MD5

    1d9b7c3504dc9c037ec7e4df5e0d78fc

  • SHA1

    37690eb13f157efe2d9e086f1da32a1035b51099

  • SHA256

    1738c03bb5e929c9b0e8d8f87140ba0e090ee230546381f8edb14c98801de3cf

  • SHA512

    8e89d40082599a8b426f8d4845902c2c2d6fd6c992828ea1509eced391af65943b7440569071c06a4f3fbbce63408ab144b916f0ad41e6bacf6a08fa008e58f9

  • SSDEEP

    768:2ioS9lv8MNcPcDkVQbcPcRovHF1/d8qZv:voS9lUMGF1/dX

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

https://rentry.org/lem9481291/raw

Targets

    • Target

      Launcher.exe

    • Size

      74KB

    • MD5

      1d9b7c3504dc9c037ec7e4df5e0d78fc

    • SHA1

      37690eb13f157efe2d9e086f1da32a1035b51099

    • SHA256

      1738c03bb5e929c9b0e8d8f87140ba0e090ee230546381f8edb14c98801de3cf

    • SHA512

      8e89d40082599a8b426f8d4845902c2c2d6fd6c992828ea1509eced391af65943b7440569071c06a4f3fbbce63408ab144b916f0ad41e6bacf6a08fa008e58f9

    • SSDEEP

      768:2ioS9lv8MNcPcDkVQbcPcRovHF1/d8qZv:voS9lUMGF1/dX

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v15

Tasks