General

  • Target

    a50438f47f27e5e3cc03f12a7386843c9659ad189c3a805f24c8abf371b16c85

  • Size

    566KB

  • Sample

    230505-xgb4saeh64

  • MD5

    e1e29b777cbcad6e896b0ac9c9a50212

  • SHA1

    e6d9e9ed89aa992d626cdc5506ab182249117aa1

  • SHA256

    a50438f47f27e5e3cc03f12a7386843c9659ad189c3a805f24c8abf371b16c85

  • SHA512

    75dcee89eee7b154dc6c6556512151db58af79ab0cbdedf122d5f4c064cdb9dd6b5927123047396e2f6de5913809870f41f4c7c6528e030cf2f53398ca6e3fdb

  • SSDEEP

    12288:HMr5y901BBa6gn7PHfgIiGtz5+JpvXtHJAKUU7JSeg8L1D:GycBa6gn7ffgGt0fvXtqE7JbD1D

Malware Config

Extracted

Family

redline

Botnet

darm

C2

217.196.96.56:4138

Attributes
  • auth_value

    d88ac8ccc04ab9979b04b46313db1648

Targets

    • Target

      a50438f47f27e5e3cc03f12a7386843c9659ad189c3a805f24c8abf371b16c85

    • Size

      566KB

    • MD5

      e1e29b777cbcad6e896b0ac9c9a50212

    • SHA1

      e6d9e9ed89aa992d626cdc5506ab182249117aa1

    • SHA256

      a50438f47f27e5e3cc03f12a7386843c9659ad189c3a805f24c8abf371b16c85

    • SHA512

      75dcee89eee7b154dc6c6556512151db58af79ab0cbdedf122d5f4c064cdb9dd6b5927123047396e2f6de5913809870f41f4c7c6528e030cf2f53398ca6e3fdb

    • SSDEEP

      12288:HMr5y901BBa6gn7PHfgIiGtz5+JpvXtHJAKUU7JSeg8L1D:GycBa6gn7ffgGt0fvXtqE7JbD1D

    • Detects Redline Stealer samples

      This rule detects the presence of Redline Stealer samples based on their unique strings.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks