General

  • Target

    avira_spotlight_setup.exe

  • Size

    34.2MB

  • Sample

    241204-x5lm5axkgx

  • MD5

    972eb9126d92fea2626690bef903aad6

  • SHA1

    9def5004dc267f77f5cfb7070e85d330b8e33638

  • SHA256

    858c355a5723e866dd9379765f2672976b4a097d836e8b5a2cd865f9819492a2

  • SHA512

    2283f4ab903c98ccfb0a79154d5ad32b4af1ac4e8e7d71d583bbdbbd0ca866449e6c7658a8ac6b1e6061c448fa34e3b0a84b84efc023e5b2c80ca71c6aeb048a

  • SSDEEP

    786432:CxgDPaSv7Kbd46LHeyvLXGx5ncGmGGxqe6PqiDViD:JKbd46bC5ncz/xy7DVo

Malware Config

Targets

    • Target

      avira_spotlight_setup.exe

    • Size

      34.2MB

    • MD5

      972eb9126d92fea2626690bef903aad6

    • SHA1

      9def5004dc267f77f5cfb7070e85d330b8e33638

    • SHA256

      858c355a5723e866dd9379765f2672976b4a097d836e8b5a2cd865f9819492a2

    • SHA512

      2283f4ab903c98ccfb0a79154d5ad32b4af1ac4e8e7d71d583bbdbbd0ca866449e6c7658a8ac6b1e6061c448fa34e3b0a84b84efc023e5b2c80ca71c6aeb048a

    • SSDEEP

      786432:CxgDPaSv7Kbd46LHeyvLXGx5ncGmGGxqe6PqiDViD:JKbd46bC5ncz/xy7DVo

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Creates new service(s)

    • Checks for any installed AV software in registry

    • Drops file in System32 directory

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

MITRE ATT&CK Enterprise v15

Tasks