General

  • Target

    21b3a4b7cd16df03f30e872abfa792e6982f1ca52c6d0ca1bf26013575f67a2c

  • Size

    567KB

  • Sample

    230505-wt6cqacb96

  • MD5

    05d3593ea63355fd3c7a0c5c2b4d6ad3

  • SHA1

    b7238c2edc47179002ca88f118cdb59e5fdb008f

  • SHA256

    21b3a4b7cd16df03f30e872abfa792e6982f1ca52c6d0ca1bf26013575f67a2c

  • SHA512

    0cbab544b852d4f7f1721441223d7262527f0796f91b69cbbcf125c72514b2b2ec1be0f4d45cb42047bde7f3f6715479157be907d232568aa21cbb22d5827a1e

  • SSDEEP

    12288:7Mrfy90cJCWZh0Kh33TwOZono5/rVH2PYO:Ay5Nw/o5/hWPYO

Malware Config

Extracted

Family

redline

Botnet

daris

C2

217.196.96.56:4138

Attributes
  • auth_value

    3491f24ae0250969cd45ce4b3fe77549

Targets

    • Target

      21b3a4b7cd16df03f30e872abfa792e6982f1ca52c6d0ca1bf26013575f67a2c

    • Size

      567KB

    • MD5

      05d3593ea63355fd3c7a0c5c2b4d6ad3

    • SHA1

      b7238c2edc47179002ca88f118cdb59e5fdb008f

    • SHA256

      21b3a4b7cd16df03f30e872abfa792e6982f1ca52c6d0ca1bf26013575f67a2c

    • SHA512

      0cbab544b852d4f7f1721441223d7262527f0796f91b69cbbcf125c72514b2b2ec1be0f4d45cb42047bde7f3f6715479157be907d232568aa21cbb22d5827a1e

    • SSDEEP

      12288:7Mrfy90cJCWZh0Kh33TwOZono5/rVH2PYO:Ay5Nw/o5/hWPYO

    • Detects Redline Stealer samples

      This rule detects the presence of Redline Stealer samples based on their unique strings.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks