General

  • Target

    9e113f45686de7a5078901beefa2680b367d8215af1ff72ab1096674ace3f19d

  • Size

    643KB

  • Sample

    230505-xb94maed28

  • MD5

    e09f36aae516f0c2207df3ca237db8c6

  • SHA1

    92a131d68ab358d49f4398371f086ee53be0aa58

  • SHA256

    9e113f45686de7a5078901beefa2680b367d8215af1ff72ab1096674ace3f19d

  • SHA512

    5a176e616bb819a4866b8362a63cf9d44513a5ad4176f2266e810beaf56d3df8d98b1184a4b8cee0996070e72f1c8b2a0e06d0ecccc953798456527e4080681a

  • SSDEEP

    12288:BMrVy90sfTJMfhUOprjlH0gs3XRWhYZQR8N1Ytu5xK79XXHdfUz4yhUOCQyG9:wyJTJMZUAPZ0x3cYG8JLg95Uz4yh2QT

Malware Config

Extracted

Family

redline

Botnet

darm

C2

217.196.96.56:4138

Attributes
  • auth_value

    d88ac8ccc04ab9979b04b46313db1648

Targets

    • Target

      9e113f45686de7a5078901beefa2680b367d8215af1ff72ab1096674ace3f19d

    • Size

      643KB

    • MD5

      e09f36aae516f0c2207df3ca237db8c6

    • SHA1

      92a131d68ab358d49f4398371f086ee53be0aa58

    • SHA256

      9e113f45686de7a5078901beefa2680b367d8215af1ff72ab1096674ace3f19d

    • SHA512

      5a176e616bb819a4866b8362a63cf9d44513a5ad4176f2266e810beaf56d3df8d98b1184a4b8cee0996070e72f1c8b2a0e06d0ecccc953798456527e4080681a

    • SSDEEP

      12288:BMrVy90sfTJMfhUOprjlH0gs3XRWhYZQR8N1Ytu5xK79XXHdfUz4yhUOCQyG9:wyJTJMZUAPZ0x3cYG8JLg95Uz4yh2QT

    • Detects Redline Stealer samples

      This rule detects the presence of Redline Stealer samples based on their unique strings.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks