Credential Stealer RedLine Reemerges - K7 Labs
Tags
attack-pattern: | Data Malware - T1587.001 Malware - T1588.001 Process Hollowing - T1055.012 Software - T1592.002 Process Hollowing - T1093 |
Common Information
Type | Value |
---|---|
UUID | d1b0f667-4b07-4837-806a-38221a1f5a6d |
Fingerprint | ec351c52293f1697 |
Analysis status | DONE |
Considered CTI value | 2 |
Text language | |
Published | July 27, 2022, 6:05 a.m. |
Added to db | Jan. 16, 2023, 3:57 p.m. |
Last updated | Oct. 23, 2024, 3:36 a.m. |
Headline | Credential Stealer RedLine Reemerges |
Title | Credential Stealer RedLine Reemerges - K7 Labs |
Detected Hints/Tags/Attributes | 24/1/9 |
Source URLs
URL Provider
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | File | 1 | deadma3ay_crypted.exe |
|
Details | File | 1 | 1079929187.exe |
|
Details | File | 48 | applaunch.exe |
|
Details | File | 10 | tokens.txt |
|
Details | File | 1 | robloxfruits.exe |
|
Details | md5 | 1 | 3A00D25C7E4B9FA8C2BE12E4328C869F |
|
Details | md5 | 1 | F3F316DB086068FBB16DF5B11827CF47 |
|
Details | md5 | 1 | 215935B2D09B884E4CFDDA7658671250 |
|
Details | IPv4 | 8 | 185.200.191.18 |