General

  • Target

    556ff5b907b2198707acda877aa48cf9765936d90706b43be27d96900ea935ea

  • Size

    556KB

  • Sample

    230505-w2nsmsfa8z

  • MD5

    2b59b2b12a9607a2534afe87f33e08c6

  • SHA1

    8e7d01f1bbae0d2785fc24a10c2ed3740ffee667

  • SHA256

    556ff5b907b2198707acda877aa48cf9765936d90706b43be27d96900ea935ea

  • SHA512

    571c754fcc609554bef968d1f9f6d055d6cf3d91f1c0f2231ad22608b706348296164a96443b73c01a1f38efdd940cd7b17531ef56c4fabc689b6791f867b87b

  • SSDEEP

    12288:CMrIy904AQcEKFvmk8+8aorXCxrRmeJ+K7IevKDKRmdR4zLmZWH:eyFYesRme57Iey+RmdR4zU+

Malware Config

Extracted

Family

redline

Botnet

darm

C2

217.196.96.56:4138

Attributes
  • auth_value

    d88ac8ccc04ab9979b04b46313db1648

Targets

    • Target

      556ff5b907b2198707acda877aa48cf9765936d90706b43be27d96900ea935ea

    • Size

      556KB

    • MD5

      2b59b2b12a9607a2534afe87f33e08c6

    • SHA1

      8e7d01f1bbae0d2785fc24a10c2ed3740ffee667

    • SHA256

      556ff5b907b2198707acda877aa48cf9765936d90706b43be27d96900ea935ea

    • SHA512

      571c754fcc609554bef968d1f9f6d055d6cf3d91f1c0f2231ad22608b706348296164a96443b73c01a1f38efdd940cd7b17531ef56c4fabc689b6791f867b87b

    • SSDEEP

      12288:CMrIy904AQcEKFvmk8+8aorXCxrRmeJ+K7IevKDKRmdR4zLmZWH:eyFYesRme57Iey+RmdR4zU+

    • Detects Redline Stealer samples

      This rule detects the presence of Redline Stealer samples based on their unique strings.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks