General

  • Target

    4766afea4efc26ab75dd4c8c7bcd8b858c0d350b058676d9d061d66844d9b615

  • Size

    479KB

  • Sample

    230506-p1yg5ahb89

  • MD5

    c7e6410ae29ebfb69d0b22f526436eaf

  • SHA1

    8f6730eec0a4b048d10ee1c8dd01acd48e53dee2

  • SHA256

    4766afea4efc26ab75dd4c8c7bcd8b858c0d350b058676d9d061d66844d9b615

  • SHA512

    7d9a80187852811d75bb6225bdd313322e39dacb220cd3f7c41e71045c44ada152500ca0637c7984d41355cff0fa7b1c69590e439bc06f195d1273e4ee0a5de7

  • SSDEEP

    6144:KSy+bnr+Op0yN90QEwdioakxV0puoCaNLmjMtPsWMMjOAcK4UtHQxjFGiz6MlEf:WMray90NqeD1a4tPs+OAqaQx59lEf

Malware Config

Extracted

Family

redline

Botnet

dariy

C2

217.196.96.101:4132

Attributes
  • auth_value

    2f34aa0d1cb1023a826825b68ebedcc8

Targets

    • Target

      4766afea4efc26ab75dd4c8c7bcd8b858c0d350b058676d9d061d66844d9b615

    • Size

      479KB

    • MD5

      c7e6410ae29ebfb69d0b22f526436eaf

    • SHA1

      8f6730eec0a4b048d10ee1c8dd01acd48e53dee2

    • SHA256

      4766afea4efc26ab75dd4c8c7bcd8b858c0d350b058676d9d061d66844d9b615

    • SHA512

      7d9a80187852811d75bb6225bdd313322e39dacb220cd3f7c41e71045c44ada152500ca0637c7984d41355cff0fa7b1c69590e439bc06f195d1273e4ee0a5de7

    • SSDEEP

      6144:KSy+bnr+Op0yN90QEwdioakxV0puoCaNLmjMtPsWMMjOAcK4UtHQxjFGiz6MlEf:WMray90NqeD1a4tPs+OAqaQx59lEf

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks