General

  • Target

    009f8dc7aa023c97fddec135cd86c68a9478f115014e7fd72c3bea76388cf75e

  • Size

    643KB

  • Sample

    230503-v9956sff94

  • MD5

    29858890051ad74ed52b303195ff9f21

  • SHA1

    67b2ebdbe72ef72d92623994c8e10f020723b46e

  • SHA256

    009f8dc7aa023c97fddec135cd86c68a9478f115014e7fd72c3bea76388cf75e

  • SHA512

    70e8649db5b4f5491a15d95935fb17149b63d1cdf6288ae61dc15b3224a5d4496ae2d952f59306f385395af9aab209eb9a015fa6ba3c99f04fd05c3830deee6c

  • SSDEEP

    12288:iMrny90Fr91Rz9HLgrhYa/R8AlyQbxmo6Jb/BiZnN4b8YmZS5cs:lykjL0Lp8PMKJ1EnNwFmZSis

Malware Config

Extracted

Family

redline

Botnet

darm

C2

217.196.96.56:4138

Attributes
  • auth_value

    d88ac8ccc04ab9979b04b46313db1648

Targets

    • Target

      009f8dc7aa023c97fddec135cd86c68a9478f115014e7fd72c3bea76388cf75e

    • Size

      643KB

    • MD5

      29858890051ad74ed52b303195ff9f21

    • SHA1

      67b2ebdbe72ef72d92623994c8e10f020723b46e

    • SHA256

      009f8dc7aa023c97fddec135cd86c68a9478f115014e7fd72c3bea76388cf75e

    • SHA512

      70e8649db5b4f5491a15d95935fb17149b63d1cdf6288ae61dc15b3224a5d4496ae2d952f59306f385395af9aab209eb9a015fa6ba3c99f04fd05c3830deee6c

    • SSDEEP

      12288:iMrny90Fr91Rz9HLgrhYa/R8AlyQbxmo6Jb/BiZnN4b8YmZS5cs:lykjL0Lp8PMKJ1EnNwFmZSis

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks