General

  • Target

    a330630c1aaa1d9307d3491f91432e2deeef409538ff80d02608e2f35bdece07

  • Size

    643KB

  • Sample

    230503-yh81ksgb88

  • MD5

    b9ac8795c37dbbdf00b1e7a284af48ad

  • SHA1

    9d01ef44fa5fc98033a41465877a15751a01809b

  • SHA256

    a330630c1aaa1d9307d3491f91432e2deeef409538ff80d02608e2f35bdece07

  • SHA512

    afa0fcd249190f120d5e228702486b27b1e50eee7f790bb9956d0599117cbe01f22d4ad44adde8751e389d62482a6d362868986fae65221a8ceb0c92ff0196f7

  • SSDEEP

    12288:9Mr8y90/kXk/WBVVMY/2L4rh5RadPWCwTo+uVvnerYy3a1El:ByGYRj/2mTalVAongJaO

Malware Config

Extracted

Family

redline

Botnet

darm

C2

217.196.96.56:4138

Attributes
  • auth_value

    d88ac8ccc04ab9979b04b46313db1648

Targets

    • Target

      a330630c1aaa1d9307d3491f91432e2deeef409538ff80d02608e2f35bdece07

    • Size

      643KB

    • MD5

      b9ac8795c37dbbdf00b1e7a284af48ad

    • SHA1

      9d01ef44fa5fc98033a41465877a15751a01809b

    • SHA256

      a330630c1aaa1d9307d3491f91432e2deeef409538ff80d02608e2f35bdece07

    • SHA512

      afa0fcd249190f120d5e228702486b27b1e50eee7f790bb9956d0599117cbe01f22d4ad44adde8751e389d62482a6d362868986fae65221a8ceb0c92ff0196f7

    • SSDEEP

      12288:9Mr8y90/kXk/WBVVMY/2L4rh5RadPWCwTo+uVvnerYy3a1El:ByGYRj/2mTalVAongJaO

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks