General

  • Target

    34886528a0d6c7d5a0d5cdf23979244b06f738b06805859293b534801b453d19

  • Size

    587KB

  • Sample

    230505-wxb82sce35

  • MD5

    1a11b7e814c1b4c8ebc79ec98e59f606

  • SHA1

    1657f18af1a8f088c3eb97339ff35c7ea9fb956a

  • SHA256

    34886528a0d6c7d5a0d5cdf23979244b06f738b06805859293b534801b453d19

  • SHA512

    d3fca36dcd47e44d7ee7e1eb18abaf1f42836a25cd9e5aa24fcfc23fc27509cc4f5b5104c6bb4b41cf4be56f9e1a2e8b2d9a941602e6be42f63f760ee152ed58

  • SSDEEP

    12288:iMrny90B5WygUTRzfbOYi9iJcYSPKdgfb9J/EefXUXrCdycN:9y9U17xiESY9+5EYNdX

Malware Config

Extracted

Family

redline

Botnet

daris

C2

217.196.96.56:4138

Attributes
  • auth_value

    3491f24ae0250969cd45ce4b3fe77549

Targets

    • Target

      34886528a0d6c7d5a0d5cdf23979244b06f738b06805859293b534801b453d19

    • Size

      587KB

    • MD5

      1a11b7e814c1b4c8ebc79ec98e59f606

    • SHA1

      1657f18af1a8f088c3eb97339ff35c7ea9fb956a

    • SHA256

      34886528a0d6c7d5a0d5cdf23979244b06f738b06805859293b534801b453d19

    • SHA512

      d3fca36dcd47e44d7ee7e1eb18abaf1f42836a25cd9e5aa24fcfc23fc27509cc4f5b5104c6bb4b41cf4be56f9e1a2e8b2d9a941602e6be42f63f760ee152ed58

    • SSDEEP

      12288:iMrny90B5WygUTRzfbOYi9iJcYSPKdgfb9J/EefXUXrCdycN:9y9U17xiESY9+5EYNdX

    • Detects Redline Stealer samples

      This rule detects the presence of Redline Stealer samples based on their unique strings.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks