General

  • Target

    d5b3e589f558d86782ebbcfbc55f836af7e43537e2433f42940dc2f1183e9978N.exe

  • Size

    3.0MB

  • Sample

    241206-bkwrpsxrhm

  • MD5

    4b756d97b00380ddd9cc1c19ad3d7730

  • SHA1

    583df398392809d685546545f3e487f16f27f694

  • SHA256

    d5b3e589f558d86782ebbcfbc55f836af7e43537e2433f42940dc2f1183e9978

  • SHA512

    84babd07d89c4d8aecf3c4c1e1be87558863b6cf08e6fcd2fbe3815e589d935ca286943a3801331ae4a3514098cd23857d12f2b70b50e44b22c03e339ddbb71b

  • SSDEEP

    49152:+M8psQwnwYE2QoljwZaiqwu51wuDy/pM1NSnI5jI51+y8LSAYVu418GUOgX+D:+3sPwYl/9GaiPUy/pqNs751Ugu7WD

Malware Config

Targets

    • Target

      d5b3e589f558d86782ebbcfbc55f836af7e43537e2433f42940dc2f1183e9978N.exe

    • Size

      3.0MB

    • MD5

      4b756d97b00380ddd9cc1c19ad3d7730

    • SHA1

      583df398392809d685546545f3e487f16f27f694

    • SHA256

      d5b3e589f558d86782ebbcfbc55f836af7e43537e2433f42940dc2f1183e9978

    • SHA512

      84babd07d89c4d8aecf3c4c1e1be87558863b6cf08e6fcd2fbe3815e589d935ca286943a3801331ae4a3514098cd23857d12f2b70b50e44b22c03e339ddbb71b

    • SSDEEP

      49152:+M8psQwnwYE2QoljwZaiqwu51wuDy/pM1NSnI5jI51+y8LSAYVu418GUOgX+D:+3sPwYl/9GaiPUy/pqNs751Ugu7WD

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks