General

  • Target

    output.pdf

  • Size

    1KB

  • Sample

    250110-ztkb2axkfs

  • MD5

    db3778162ef03444aaf68624f1be9f46

  • SHA1

    17a74c29ddad59a4c9a5d5b890424de9c1215f10

  • SHA256

    efc46388e00b249aa532bf7ef8e49648fbc5754fb515b1c221a0774ccdd89ae0

  • SHA512

    b77d5ab13eec233d626c04cd73c2e75610d6155f4bc770556d4ddff86bafe154be19255319dec81a30374010317f7fb928b95d321ff4e4de17ba1b30c4ca29e9

Malware Config

Targets

    • Target

      output.pdf

    • Size

      1KB

    • MD5

      db3778162ef03444aaf68624f1be9f46

    • SHA1

      17a74c29ddad59a4c9a5d5b890424de9c1215f10

    • SHA256

      efc46388e00b249aa532bf7ef8e49648fbc5754fb515b1c221a0774ccdd89ae0

    • SHA512

      b77d5ab13eec233d626c04cd73c2e75610d6155f4bc770556d4ddff86bafe154be19255319dec81a30374010317f7fb928b95d321ff4e4de17ba1b30c4ca29e9

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks