General

  • Target

    73bd5e94055c1896a006261d1507d60bd20654f073e06fde9db6a337865bc7f9

  • Size

    141KB

  • Sample

    250129-bjqjasyrej

  • MD5

    cfd49ff803bee148321ed6d276e15546

  • SHA1

    ba070a939674ddb00af3b0a0287103be44da6574

  • SHA256

    73bd5e94055c1896a006261d1507d60bd20654f073e06fde9db6a337865bc7f9

  • SHA512

    79bb968818525153b1361071988f2f21d7198e1ae477f05d496c6035796797b9d482361d820129c0ac924e7701ff374ea52787787733250b47e7d83cfebb8ea2

  • SSDEEP

    3072:BK1JZOpTvVQZ+rcIeRYs6YmszJqoD277BpGGoMTb3R35dINX9r5pxk:QOpu0rjeRbVJqoDm1pGGoMTb3RDINN

Malware Config

Targets

    • Target

      73bd5e94055c1896a006261d1507d60bd20654f073e06fde9db6a337865bc7f9

    • Size

      141KB

    • MD5

      cfd49ff803bee148321ed6d276e15546

    • SHA1

      ba070a939674ddb00af3b0a0287103be44da6574

    • SHA256

      73bd5e94055c1896a006261d1507d60bd20654f073e06fde9db6a337865bc7f9

    • SHA512

      79bb968818525153b1361071988f2f21d7198e1ae477f05d496c6035796797b9d482361d820129c0ac924e7701ff374ea52787787733250b47e7d83cfebb8ea2

    • SSDEEP

      3072:BK1JZOpTvVQZ+rcIeRYs6YmszJqoD277BpGGoMTb3R35dINX9r5pxk:QOpu0rjeRbVJqoDm1pGGoMTb3RDINN

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks