General

  • Target

    2c1eb17b00293ee879e7c37656be00acf3750f51f38923fca7aefd69ee330708

  • Size

    1.5MB

  • Sample

    230505-wv93ased3w

  • MD5

    13a3b1667c42a6163d4da65ecb50d653

  • SHA1

    937dff1b40d906d818c343ebc42b3ed61cade5ea

  • SHA256

    2c1eb17b00293ee879e7c37656be00acf3750f51f38923fca7aefd69ee330708

  • SHA512

    d65cb0aef8989311fe13affb2de10217be831e73af36f2c5eb5323160f2c52e1ed292c05bdfe32cc5a22924a197afa8daade5ba666a5b2489dad7542f55fc71a

  • SSDEEP

    24576:Iyu26XBUrVuI2IUVEw7i2jsdxmNKzruhpxRquuAi45i7oCne18kyfLriruNqCUV8:PubKrMIc+w7iVdxi5hvRquuAHo7NO8kW

Malware Config

Extracted

Family

redline

Botnet

mask

C2

217.196.96.56:4138

Attributes
  • auth_value

    31aef25be0febb8e491794ef7f502c50

Extracted

Family

redline

Botnet

boom

C2

217.196.96.56:4138

Attributes
  • auth_value

    1ce6aebe15bac07a7bc88b114bc49335

Targets

    • Target

      2c1eb17b00293ee879e7c37656be00acf3750f51f38923fca7aefd69ee330708

    • Size

      1.5MB

    • MD5

      13a3b1667c42a6163d4da65ecb50d653

    • SHA1

      937dff1b40d906d818c343ebc42b3ed61cade5ea

    • SHA256

      2c1eb17b00293ee879e7c37656be00acf3750f51f38923fca7aefd69ee330708

    • SHA512

      d65cb0aef8989311fe13affb2de10217be831e73af36f2c5eb5323160f2c52e1ed292c05bdfe32cc5a22924a197afa8daade5ba666a5b2489dad7542f55fc71a

    • SSDEEP

      24576:Iyu26XBUrVuI2IUVEw7i2jsdxmNKzruhpxRquuAi45i7oCne18kyfLriruNqCUV8:PubKrMIc+w7iVdxi5hvRquuAHo7NO8kW

    • Detects Redline Stealer samples

      This rule detects the presence of Redline Stealer samples based on their unique strings.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks