General

  • Target

    5cfa22e8d4102ffccd45ef8e80237e0f.exe

  • Size

    965KB

  • Sample

    200630-l8vtcvtshj

  • MD5

    5cfa22e8d4102ffccd45ef8e80237e0f

  • SHA1

    9940e693d9a1424134e85e86bd61d278c1d31ab1

  • SHA256

    9eee4d294f2111c25d601095dc4e10e7793c99d270c47c827c7316adf1393e73

  • SHA512

    1038662fab4b10e73d401f33d460a0f6a492e5e8b882a0182db2693208b64eaedeac8adee4e82ec66ecad9bb55dee207f4b54e4861e5aef2c2da1f263f9a6f07

Malware Config

Targets

    • Target

      5cfa22e8d4102ffccd45ef8e80237e0f.exe

    • Size

      965KB

    • MD5

      5cfa22e8d4102ffccd45ef8e80237e0f

    • SHA1

      9940e693d9a1424134e85e86bd61d278c1d31ab1

    • SHA256

      9eee4d294f2111c25d601095dc4e10e7793c99d270c47c827c7316adf1393e73

    • SHA512

      1038662fab4b10e73d401f33d460a0f6a492e5e8b882a0182db2693208b64eaedeac8adee4e82ec66ecad9bb55dee207f4b54e4861e5aef2c2da1f263f9a6f07

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks for installed software on the system

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Modifies system certificate store

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Tasks