General

  • Target

    d92a5027064b179847af499a35df1b41.exe

  • Size

    587KB

  • Sample

    200630-bdfqll9ckx

  • MD5

    d92a5027064b179847af499a35df1b41

  • SHA1

    6682ccf09ee9c15fce3100a94edced4023a2a752

  • SHA256

    a3d5b36f6bf32386cb45befc10693eee48606edc18587769357338a4a2b9161a

  • SHA512

    79d2008b0041d17d634b4ed39e2a1129a925637e0303688b4150b5db0b88b72bc533ea9d7cc490662e3c7c64a68ff1b273103ffead6ed41d50188680d22dbe95

Malware Config

Targets

    • Target

      d92a5027064b179847af499a35df1b41.exe

    • Size

      587KB

    • MD5

      d92a5027064b179847af499a35df1b41

    • SHA1

      6682ccf09ee9c15fce3100a94edced4023a2a752

    • SHA256

      a3d5b36f6bf32386cb45befc10693eee48606edc18587769357338a4a2b9161a

    • SHA512

      79d2008b0041d17d634b4ed39e2a1129a925637e0303688b4150b5db0b88b72bc533ea9d7cc490662e3c7c64a68ff1b273103ffead6ed41d50188680d22dbe95

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks for installed software on the system

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Modifies system certificate store

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Tasks