General

  • Target

    9ff9c0d69d4c28d8e6f75e4ce4a34e9e.exe

  • Size

    479KB

  • Sample

    230506-skk4msbh7v

  • MD5

    9ff9c0d69d4c28d8e6f75e4ce4a34e9e

  • SHA1

    b562746c49f629225607841cdeb2c899226beb9f

  • SHA256

    372e1f000ad19a9cdb70570968e8bc0380c5702359d55267cae2f77e064fb8d0

  • SHA512

    d66080f6ea3639ad650ce7bd0d224e04a691ec03f0ab93c7a4bb0e0761ff3fea94e5b5b67508bd1fb4a6b5ff6c12e04f82eced0fbd7ca94217ad359f7eb2ab1d

  • SSDEEP

    12288:2MrCy90ci7G6sMd9YFz5KAUERMcAjED7I6XjW0kaeyQvx:gyc7gMd9YFNKcd7NjWvyq

Malware Config

Extracted

Family

redline

Botnet

dariy

C2

217.196.96.101:4132

Attributes
  • auth_value

    2f34aa0d1cb1023a826825b68ebedcc8

Targets

    • Target

      9ff9c0d69d4c28d8e6f75e4ce4a34e9e.exe

    • Size

      479KB

    • MD5

      9ff9c0d69d4c28d8e6f75e4ce4a34e9e

    • SHA1

      b562746c49f629225607841cdeb2c899226beb9f

    • SHA256

      372e1f000ad19a9cdb70570968e8bc0380c5702359d55267cae2f77e064fb8d0

    • SHA512

      d66080f6ea3639ad650ce7bd0d224e04a691ec03f0ab93c7a4bb0e0761ff3fea94e5b5b67508bd1fb4a6b5ff6c12e04f82eced0fbd7ca94217ad359f7eb2ab1d

    • SSDEEP

      12288:2MrCy90ci7G6sMd9YFz5KAUERMcAjED7I6XjW0kaeyQvx:gyc7gMd9YFNKcd7NjWvyq

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks