General

  • Target

    aee96b2d176cd39803b1d228b1916977cbc369eb83c9622c868284526ed28212

  • Size

    1.4MB

  • Sample

    230503-2ge8nagh83

  • MD5

    e298c5ba8c1270a915cd0ea96aadfc02

  • SHA1

    881372d16714491f875a9976571c9e5b7b0fe17a

  • SHA256

    aee96b2d176cd39803b1d228b1916977cbc369eb83c9622c868284526ed28212

  • SHA512

    13e7eec5fab14ad8f80ed1b0fde64ae361369548273dcfa3ef9f6b11b9d7c4e6a710193798d208ea135144ee1c718eeb42727d81bdf2a63ea78135911b9a3528

  • SSDEEP

    24576:ZyV9lO1gfstJtWZxHRnIjjOPntMsguxumFcVNU165lca50M/IpuJqt5:MhsvJtWZNBIHOPtMszxufV6165lp53J

Malware Config

Extracted

Family

redline

Botnet

mask

C2

217.196.96.56:4138

Attributes
  • auth_value

    31aef25be0febb8e491794ef7f502c50

Targets

    • Target

      aee96b2d176cd39803b1d228b1916977cbc369eb83c9622c868284526ed28212

    • Size

      1.4MB

    • MD5

      e298c5ba8c1270a915cd0ea96aadfc02

    • SHA1

      881372d16714491f875a9976571c9e5b7b0fe17a

    • SHA256

      aee96b2d176cd39803b1d228b1916977cbc369eb83c9622c868284526ed28212

    • SHA512

      13e7eec5fab14ad8f80ed1b0fde64ae361369548273dcfa3ef9f6b11b9d7c4e6a710193798d208ea135144ee1c718eeb42727d81bdf2a63ea78135911b9a3528

    • SSDEEP

      24576:ZyV9lO1gfstJtWZxHRnIjjOPntMsguxumFcVNU165lca50M/IpuJqt5:MhsvJtWZNBIHOPtMszxufV6165lp53J

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks