General

  • Target

    5c8f76ef10a7d2493dec6399c4225a73.exe

  • Size

    1.0MB

  • Sample

    200731-ve35kw7mn6

  • MD5

    5c8f76ef10a7d2493dec6399c4225a73

  • SHA1

    f40891e66c3b6a568a822a6a09868370ea80a3a1

  • SHA256

    637d172395f876a73f77476c2ab1261e289b8f12395110627a7c93583b11c868

  • SHA512

    b244a4e76d4fa9b73008bac323443f0c26e9a6053550c0b7ae174b7434ae4a28f9d2982995ec999c91cfd3945f0a248ee4c95dfd21b20569a8b0bca361f31f0c

Malware Config

Targets

    • Target

      5c8f76ef10a7d2493dec6399c4225a73.exe

    • Size

      1.0MB

    • MD5

      5c8f76ef10a7d2493dec6399c4225a73

    • SHA1

      f40891e66c3b6a568a822a6a09868370ea80a3a1

    • SHA256

      637d172395f876a73f77476c2ab1261e289b8f12395110627a7c93583b11c868

    • SHA512

      b244a4e76d4fa9b73008bac323443f0c26e9a6053550c0b7ae174b7434ae4a28f9d2982995ec999c91cfd3945f0a248ee4c95dfd21b20569a8b0bca361f31f0c

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Program crash

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Remote System Discovery

1
T1018

Tasks