General

  • Target

    891be784d05c66d2591cc9fa706920212880973c35c5692b8f404674210d00d9

  • Size

    600KB

  • Sample

    230505-w8q7caga3x

  • MD5

    3095e8552fc8a6b3e97fd5f239ccedb0

  • SHA1

    39235e529b6627606e8261b334bfcb561fc748e1

  • SHA256

    891be784d05c66d2591cc9fa706920212880973c35c5692b8f404674210d00d9

  • SHA512

    b8ec2fdbc6dd9fedd93e6a5456140c0e29f5334ddec9cccb62c15dadaaf57bda91ccb34e467e266ae104379019a53d37de9233fd705467253af700db1e1f34bb

  • SSDEEP

    12288:EMr8y90UiqEyQwUwN3WHE9Ajw2VJ9y8VgEk11dkyZNlsFSRf1WfbYPu:oyHZEvrrHEwRVJw8VgpnbNzfAfbYPu

Malware Config

Targets

    • Target

      891be784d05c66d2591cc9fa706920212880973c35c5692b8f404674210d00d9

    • Size

      600KB

    • MD5

      3095e8552fc8a6b3e97fd5f239ccedb0

    • SHA1

      39235e529b6627606e8261b334bfcb561fc748e1

    • SHA256

      891be784d05c66d2591cc9fa706920212880973c35c5692b8f404674210d00d9

    • SHA512

      b8ec2fdbc6dd9fedd93e6a5456140c0e29f5334ddec9cccb62c15dadaaf57bda91ccb34e467e266ae104379019a53d37de9233fd705467253af700db1e1f34bb

    • SSDEEP

      12288:EMr8y90UiqEyQwUwN3WHE9Ajw2VJ9y8VgEk11dkyZNlsFSRf1WfbYPu:oyHZEvrrHEwRVJw8VgpnbNzfAfbYPu

    • Detects Redline Stealer samples

      This rule detects the presence of Redline Stealer samples based on their unique strings.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks