General

  • Target

    abefd9014aa30843b180c84db652d9fc229d41703b580e5fb0dd6c0a35abb2e7

  • Size

    479KB

  • Sample

    230506-r75acshf28

  • MD5

    debd2e71354563bb0efd113fc439c51f

  • SHA1

    3e1bace9df783acb2ba417483d343a032d67256b

  • SHA256

    abefd9014aa30843b180c84db652d9fc229d41703b580e5fb0dd6c0a35abb2e7

  • SHA512

    528d69e9c75079a385894e5141b32dc5b34d200ad4dd0850839dc92b0542917c783fe3e124a3e798fe37717b48cd15a94fd473e5f75fde82eefdbc1804219a2d

  • SSDEEP

    12288:rMrMy90drZVqZb+BXZpbKxKxUJIMi7gX:ny6ZKUZpexKoYy

Malware Config

Extracted

Family

redline

Botnet

dariy

C2

217.196.96.101:4132

Attributes
  • auth_value

    2f34aa0d1cb1023a826825b68ebedcc8

Targets

    • Target

      abefd9014aa30843b180c84db652d9fc229d41703b580e5fb0dd6c0a35abb2e7

    • Size

      479KB

    • MD5

      debd2e71354563bb0efd113fc439c51f

    • SHA1

      3e1bace9df783acb2ba417483d343a032d67256b

    • SHA256

      abefd9014aa30843b180c84db652d9fc229d41703b580e5fb0dd6c0a35abb2e7

    • SHA512

      528d69e9c75079a385894e5141b32dc5b34d200ad4dd0850839dc92b0542917c783fe3e124a3e798fe37717b48cd15a94fd473e5f75fde82eefdbc1804219a2d

    • SSDEEP

      12288:rMrMy90drZVqZb+BXZpbKxKxUJIMi7gX:ny6ZKUZpexKoYy

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks