General

  • Target

    89b25ca193923e639278c5d2d268fbedec1e4c6f7246f303532cee15cefc602a

  • Size

    587KB

  • Sample

    230504-jcmstsce9w

  • MD5

    dde73d6e27c98a61c042111c0ba63a49

  • SHA1

    48e5de8b0cb39d989a8241353f86ebe76388e6bc

  • SHA256

    89b25ca193923e639278c5d2d268fbedec1e4c6f7246f303532cee15cefc602a

  • SHA512

    0be7060b6675b48c5f24f84cbfffb329957368cc5ff73cda338e7caf24fbaca81f743485309cffafdd8b9681e64151f9675a63cc63a895797de0496367630490

  • SSDEEP

    12288:YMrdy90tGRUbSpgmXbzXH4fyjdmfGMKjT8mTRYILaw:VyuGFvXbzXrA9KvtTmIOw

Malware Config

Extracted

Family

redline

Botnet

daris

C2

217.196.96.56:4138

Attributes
  • auth_value

    3491f24ae0250969cd45ce4b3fe77549

Targets

    • Target

      89b25ca193923e639278c5d2d268fbedec1e4c6f7246f303532cee15cefc602a

    • Size

      587KB

    • MD5

      dde73d6e27c98a61c042111c0ba63a49

    • SHA1

      48e5de8b0cb39d989a8241353f86ebe76388e6bc

    • SHA256

      89b25ca193923e639278c5d2d268fbedec1e4c6f7246f303532cee15cefc602a

    • SHA512

      0be7060b6675b48c5f24f84cbfffb329957368cc5ff73cda338e7caf24fbaca81f743485309cffafdd8b9681e64151f9675a63cc63a895797de0496367630490

    • SSDEEP

      12288:YMrdy90tGRUbSpgmXbzXH4fyjdmfGMKjT8mTRYILaw:VyuGFvXbzXrA9KvtTmIOw

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks