General

  • Target

    0044c9f9b8eb7165b726684d03db37792e9c2551f5e95b11e9ac0f91b4c73c68

  • Size

    600KB

  • Sample

    230504-lhe2aabc93

  • MD5

    9d91630946c8ff91a9e66b03e6ae1b5e

  • SHA1

    e74037cb5eecdf782ae43f8bbc353df03f8c71c4

  • SHA256

    0044c9f9b8eb7165b726684d03db37792e9c2551f5e95b11e9ac0f91b4c73c68

  • SHA512

    91c366cf9acea710d761197641af5bcb8ad5bcdb5efa20ab296d7c5ffcfca12801c7fddfeb774b877f626a5981a8f47e70c6c3f6fb8b0643ae747a586cb85f22

  • SSDEEP

    12288:VMriy90Pz9MAEu1R/gDHNoP9SJzVeBLwTYVR5dpg:rye9+uGoP9keFRVbdpg

Malware Config

Extracted

Family

redline

Botnet

daris

C2

217.196.96.56:4138

Attributes
  • auth_value

    3491f24ae0250969cd45ce4b3fe77549

Targets

    • Target

      0044c9f9b8eb7165b726684d03db37792e9c2551f5e95b11e9ac0f91b4c73c68

    • Size

      600KB

    • MD5

      9d91630946c8ff91a9e66b03e6ae1b5e

    • SHA1

      e74037cb5eecdf782ae43f8bbc353df03f8c71c4

    • SHA256

      0044c9f9b8eb7165b726684d03db37792e9c2551f5e95b11e9ac0f91b4c73c68

    • SHA512

      91c366cf9acea710d761197641af5bcb8ad5bcdb5efa20ab296d7c5ffcfca12801c7fddfeb774b877f626a5981a8f47e70c6c3f6fb8b0643ae747a586cb85f22

    • SSDEEP

      12288:VMriy90Pz9MAEu1R/gDHNoP9SJzVeBLwTYVR5dpg:rye9+uGoP9keFRVbdpg

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks