General
-
Target
b284ac0acaa2258723002e65cb90bd3c13ab554c483a41907ce973602dbab072.7z
-
Size
2.1MB
-
Sample
240905-pgqcea1fkd
-
MD5
fc2f2cdf463747509573ff427b02c48a
-
SHA1
f024fb301d59bddb14ad05ed12d0e515e67d0fe8
-
SHA256
b284ac0acaa2258723002e65cb90bd3c13ab554c483a41907ce973602dbab072
-
SHA512
a708e6f7842798b96dbab74324388a1e26048eba685481b7262cb9b237584fd6c31b7beb392403b7cf20d752732c951f15c56cd0a62df994709baf9d0dcf6b27
-
SSDEEP
49152:ans+cQuFwdqot9uxVUk6yCpEc1/4AzF1vAwiybYzw:anRruFwdqom8LycBvArsYE
Static task
static1
Behavioral task
behavioral1
Sample
RedEngine/RedEngine.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
RedEngine/RedEngine.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
RedEngine/libEGL.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
RedEngine/libEGL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
RedEngine/libGLESv2.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
RedEngine/libGLESv2.dll
Resource
win10v2004-20240802-en
Malware Config
Extracted
https://rentry.org/pancek61111111111111/raw
Extracted
https://bitbucket.org/goodfuture91/goodfuture511/raw/64c80586bb78a4f95934a071956e2dccca8efe42/p.rar
Targets
-
-
Target
RedEngine/RedEngine.exe
-
Size
8KB
-
MD5
4fbb04c9e3aa983cbfc4980a7b5b7041
-
SHA1
34aeca658462e638521bc384a4935251678a9a78
-
SHA256
24f095f4f5796561cc9f9c60f71a2182fee89692f239c92e7447af3461e12731
-
SHA512
615534039ad97fea8c881656a53b6b0ead41e3770e0a3f3cd38052585dc5a102ab25b824c59c3142b75f6b62e56ff46ab981e27c889ded28a5cc2884581863bc
-
SSDEEP
192:Gh9Lz2jG4pFMYqLDQ1bhxZzzzhGjcJr9emxan6+UqawcTnYPvkVNxdpD:Gh9Liy4kLDQHtGjcJrQmxan6+/xcTnYg
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Blocklisted process makes network request
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-
-
-
Target
RedEngine/libEGL.dll
-
Size
469KB
-
MD5
2a568dc1f848b2948dfd90c8ebeb58c6
-
SHA1
e765ca8946ce091651c6722c650d9ad5edfeb5d5
-
SHA256
c00285c0174024739997898e98444deb4cbfe6b571cca69ca3bf8e5ab3ea5bbe
-
SHA512
a6ce4ead89933d32ea24766f887655ee5894ef1813faf97ebb2191a775488ba2fd77bcb4aedefc273ef85f5a93a9a5dd3d35b213a52d95b0cc4111708d9fcee5
-
SSDEEP
3072:4kgdNXYPuSHGjFXVYbAQSIoU8w1Z5iErbFdWE7D6i/wZJothADZX+Lcq7gv+xt4f:47Vl/HxUniSbFdH1/wXFufMG9x2qPz
Score1/10 -
-
-
Target
RedEngine/libGLESv2.dll
-
Size
7.2MB
-
MD5
5afc7b4ae2a76fa9a2b740734ef9f9f7
-
SHA1
fb7d539a77883ee2ad2036c0243ef9acb49132ab
-
SHA256
9168eac79d66301f49c8b2d501e8ea79b52f6b3f8b4e6aac06348fe24bf845d6
-
SHA512
132ed0e481192f31e5aedde4f4386beac099c8ce86778b097b98cbd7ada6e7fcf15cda271b0ec07bab4edbb9429937ea9aae139d6ba7b74a4f4238471d8ea773
-
SSDEEP
98304:vD+WTl1xDfbWziTwMPdkUqqXyXm3C/0+:vDTnxezkPqqiCC/
Score1/10 -
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Modify Registry
1Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1