General

  • Target

    1215363ab33e4388037979cc4d051ce5.exe

  • Size

    602KB

  • Sample

    230504-lnrl9sbd34

  • MD5

    1215363ab33e4388037979cc4d051ce5

  • SHA1

    a96597ad5156e6c92d7e9098bfc7e279e612b366

  • SHA256

    6755c42c0b84482aed1334a662b8f834e16272a7330c5910b0f22c1d56828568

  • SHA512

    94ec377836b9435a2940c27d04ee426c8b575e5d260780e9fb434ed1b416a5ad0839d85ba7f0a47faad99b9615cf372e3d3775da47be48c873f996d829b8bdc3

  • SSDEEP

    12288:NMr6y90ublr+lkJfRLPQxgetlcrwbGVGWxF2L:DylKRFtDGVGf

Malware Config

Extracted

Family

redline

Botnet

daris

C2

217.196.96.56:4138

Attributes
  • auth_value

    3491f24ae0250969cd45ce4b3fe77549

Targets

    • Target

      1215363ab33e4388037979cc4d051ce5.exe

    • Size

      602KB

    • MD5

      1215363ab33e4388037979cc4d051ce5

    • SHA1

      a96597ad5156e6c92d7e9098bfc7e279e612b366

    • SHA256

      6755c42c0b84482aed1334a662b8f834e16272a7330c5910b0f22c1d56828568

    • SHA512

      94ec377836b9435a2940c27d04ee426c8b575e5d260780e9fb434ed1b416a5ad0839d85ba7f0a47faad99b9615cf372e3d3775da47be48c873f996d829b8bdc3

    • SSDEEP

      12288:NMr6y90ublr+lkJfRLPQxgetlcrwbGVGWxF2L:DylKRFtDGVGf

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks