General

  • Target

    39e7e14afa9f6d9c46cfbae14b6c20460596fe0abf2d5c9b58d470a6954b80d6

  • Size

    1.5MB

  • Sample

    230505-wx7d7aef4t

  • MD5

    f7422d5b08f3d9848307dce0c4163711

  • SHA1

    d4a3ee122af817ea2b4fd8d90b4fc992d6e76190

  • SHA256

    39e7e14afa9f6d9c46cfbae14b6c20460596fe0abf2d5c9b58d470a6954b80d6

  • SHA512

    49d655504c12332886e60e88102c078de4d8a3b7c80c6ced538c66bb5c4658b23b20bd64cc12bc541ef9bc0111b432a2d13fb45ae6b5135fd6c1bb6252d809a9

  • SSDEEP

    49152:wyqvjz/QO92TgxYXCy7bTqn1oocWf+V872lTOwhp:Pqv592TgxWpLq1oAf+Llywh

Malware Config

Extracted

Family

redline

Botnet

boom

C2

217.196.96.56:4138

Attributes
  • auth_value

    1ce6aebe15bac07a7bc88b114bc49335

Targets

    • Target

      39e7e14afa9f6d9c46cfbae14b6c20460596fe0abf2d5c9b58d470a6954b80d6

    • Size

      1.5MB

    • MD5

      f7422d5b08f3d9848307dce0c4163711

    • SHA1

      d4a3ee122af817ea2b4fd8d90b4fc992d6e76190

    • SHA256

      39e7e14afa9f6d9c46cfbae14b6c20460596fe0abf2d5c9b58d470a6954b80d6

    • SHA512

      49d655504c12332886e60e88102c078de4d8a3b7c80c6ced538c66bb5c4658b23b20bd64cc12bc541ef9bc0111b432a2d13fb45ae6b5135fd6c1bb6252d809a9

    • SSDEEP

      49152:wyqvjz/QO92TgxYXCy7bTqn1oocWf+V872lTOwhp:Pqv592TgxWpLq1oAf+Llywh

    • Detects Redline Stealer samples

      This rule detects the presence of Redline Stealer samples based on their unique strings.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks