General

  • Target

    99119b9edb2480144406d65c2e0034f36f8e7a157f8d0ec0996631d92b219c36

  • Size

    711KB

  • Sample

    230505-xam8gagc4z

  • MD5

    dcd65a4a41fbd4b972b162a22bce5749

  • SHA1

    59ae59c03ce04badd5ad779a3f7c7f1182571003

  • SHA256

    99119b9edb2480144406d65c2e0034f36f8e7a157f8d0ec0996631d92b219c36

  • SHA512

    84b749219f78ca04d882c6dffca65285098ca81cc5e54e1491b96d0a2ec6f42f91144e03b3f23725f863ce590c62baddcb29bb414ceaf43d468fe92f81ba0c0e

  • SSDEEP

    12288:mMrPy90qrHWycTDpk0Non8PTiwlcTBQCp8+luz3AMgRlmeVvc2:JydbWd2so8+2IBQe8HjAPRoeVvc2

Malware Config

Extracted

Family

redline

Botnet

daris

C2

217.196.96.56:4138

Attributes
  • auth_value

    3491f24ae0250969cd45ce4b3fe77549

Targets

    • Target

      99119b9edb2480144406d65c2e0034f36f8e7a157f8d0ec0996631d92b219c36

    • Size

      711KB

    • MD5

      dcd65a4a41fbd4b972b162a22bce5749

    • SHA1

      59ae59c03ce04badd5ad779a3f7c7f1182571003

    • SHA256

      99119b9edb2480144406d65c2e0034f36f8e7a157f8d0ec0996631d92b219c36

    • SHA512

      84b749219f78ca04d882c6dffca65285098ca81cc5e54e1491b96d0a2ec6f42f91144e03b3f23725f863ce590c62baddcb29bb414ceaf43d468fe92f81ba0c0e

    • SSDEEP

      12288:mMrPy90qrHWycTDpk0Non8PTiwlcTBQCp8+luz3AMgRlmeVvc2:JydbWd2so8+2IBQe8HjAPRoeVvc2

    • Detects Redline Stealer samples

      This rule detects the presence of Redline Stealer samples based on their unique strings.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks