General

  • Target

    6bba46af077fe83d12f475eb3a1133d52d3d9abccad8ccb2d58d88469fe9dd68

  • Size

    479KB

  • Sample

    230506-s8n57shg76

  • MD5

    361afa1ca53209d1a14bdf9e7020d270

  • SHA1

    8aa9c0bec3ff0239a77c6c296891b8b1200ca401

  • SHA256

    6bba46af077fe83d12f475eb3a1133d52d3d9abccad8ccb2d58d88469fe9dd68

  • SHA512

    d1abd063edd9090002d73cabe82a6d10902ba3f8432eea3ba9b6a05b78fdcaaeed76a5e00d4e735812348f5ffca18d1f2d7999e60c611ed7bce650919e9f74d1

  • SSDEEP

    12288:LMray90gVnS0x1zME2KSKlgVZdIdMJjfAiXlKABYW:tyvRQNj5dwqfrXlFB

Malware Config

Extracted

Family

redline

Botnet

dariy

C2

217.196.96.101:4132

Attributes
  • auth_value

    2f34aa0d1cb1023a826825b68ebedcc8

Targets

    • Target

      6bba46af077fe83d12f475eb3a1133d52d3d9abccad8ccb2d58d88469fe9dd68

    • Size

      479KB

    • MD5

      361afa1ca53209d1a14bdf9e7020d270

    • SHA1

      8aa9c0bec3ff0239a77c6c296891b8b1200ca401

    • SHA256

      6bba46af077fe83d12f475eb3a1133d52d3d9abccad8ccb2d58d88469fe9dd68

    • SHA512

      d1abd063edd9090002d73cabe82a6d10902ba3f8432eea3ba9b6a05b78fdcaaeed76a5e00d4e735812348f5ffca18d1f2d7999e60c611ed7bce650919e9f74d1

    • SSDEEP

      12288:LMray90gVnS0x1zME2KSKlgVZdIdMJjfAiXlKABYW:tyvRQNj5dwqfrXlFB

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks