General

  • Target

    c9d08b394b221a01b5f34d1a1d4be3851f733fcdb034bc4fec2a9472e4c69b49

  • Size

    1.5MB

  • Sample

    230505-yajeysbh3t

  • MD5

    1b6ec75ca5fb03d61529a4415245f221

  • SHA1

    4e4bffe043e1e3492f23f11ba3627abe13a85e56

  • SHA256

    c9d08b394b221a01b5f34d1a1d4be3851f733fcdb034bc4fec2a9472e4c69b49

  • SHA512

    41523a7eb45a74a7cc31e18958e19c52677b43934e6bcbc1fbfddff85950b3592bd2b93e9a6281f0f965206b68758eccf8d46ffadde7dfd43d1f751a99443b8a

  • SSDEEP

    49152:fUEDid+7eqxn1us5m2w7A0H1R9GBWtN9uksa:MEe0eqmiJw7fR9GBQuks

Malware Config

Targets

    • Target

      c9d08b394b221a01b5f34d1a1d4be3851f733fcdb034bc4fec2a9472e4c69b49

    • Size

      1.5MB

    • MD5

      1b6ec75ca5fb03d61529a4415245f221

    • SHA1

      4e4bffe043e1e3492f23f11ba3627abe13a85e56

    • SHA256

      c9d08b394b221a01b5f34d1a1d4be3851f733fcdb034bc4fec2a9472e4c69b49

    • SHA512

      41523a7eb45a74a7cc31e18958e19c52677b43934e6bcbc1fbfddff85950b3592bd2b93e9a6281f0f965206b68758eccf8d46ffadde7dfd43d1f751a99443b8a

    • SSDEEP

      49152:fUEDid+7eqxn1us5m2w7A0H1R9GBWtN9uksa:MEe0eqmiJw7fR9GBQuks

    • Detects Redline Stealer samples

      This rule detects the presence of Redline Stealer samples based on their unique strings.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks