General

  • Target

    1987d6f8264d89f880dbec37718824902359d4e0775907dd8100b0d97dff5149

  • Size

    1.5MB

  • Sample

    230503-xgyb1shh8s

  • MD5

    aeb537d7387d404f3f846679f978b554

  • SHA1

    3120fbeed5b417606d5803cc2bbebd1474b59aa8

  • SHA256

    1987d6f8264d89f880dbec37718824902359d4e0775907dd8100b0d97dff5149

  • SHA512

    f0efe8dc089a994b466f6d2e51926614796619346006e7af1d54bc033640b63ea88103dfe3928c6107010cc79bbb4b4907d3560fb0853c9ba3f60f3cb0e6d4d0

  • SSDEEP

    24576:cy4zwHysrabTaQGa/3RWy7Juc2V7XkpSfxqbB1/pxei0N5DnxqtCHQb5qZXYBe+z:L4zZfOQGc3Rh7JgVXqbB1/vei0/DxuEa

Malware Config

Extracted

Family

redline

Botnet

mask

C2

217.196.96.56:4138

Attributes
  • auth_value

    31aef25be0febb8e491794ef7f502c50

Extracted

Family

redline

Botnet

boom

C2

217.196.96.56:4138

Attributes
  • auth_value

    1ce6aebe15bac07a7bc88b114bc49335

Targets

    • Target

      1987d6f8264d89f880dbec37718824902359d4e0775907dd8100b0d97dff5149

    • Size

      1.5MB

    • MD5

      aeb537d7387d404f3f846679f978b554

    • SHA1

      3120fbeed5b417606d5803cc2bbebd1474b59aa8

    • SHA256

      1987d6f8264d89f880dbec37718824902359d4e0775907dd8100b0d97dff5149

    • SHA512

      f0efe8dc089a994b466f6d2e51926614796619346006e7af1d54bc033640b63ea88103dfe3928c6107010cc79bbb4b4907d3560fb0853c9ba3f60f3cb0e6d4d0

    • SSDEEP

      24576:cy4zwHysrabTaQGa/3RWy7Juc2V7XkpSfxqbB1/pxei0N5DnxqtCHQb5qZXYBe+z:L4zZfOQGc3Rh7JgVXqbB1/vei0/DxuEa

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks