General

  • Target

    ed01a9e4034c2f42409a9bdcac9a3b3868b39b5becd8ac14ba93bdb6788234be

  • Size

    480KB

  • Sample

    230506-tlh64shh28

  • MD5

    1a0e267aec9b9ab473936c94c74c2ad7

  • SHA1

    a0953327b587d4b26991f06cb56d59dbbb6daf8a

  • SHA256

    ed01a9e4034c2f42409a9bdcac9a3b3868b39b5becd8ac14ba93bdb6788234be

  • SHA512

    426a4507cf078d4ad4e87001ce3c9bf58909566a877b9a3e2c7a9fd6b67217ae3c6c2ed55e116562369ffd78940e0624caf7baeadaf702b3abc47271ec454394

  • SSDEEP

    12288:NMrUy90ceYRL3MfanFwF69W0hP2/Hx8f4TPOT5L:1ygmLnFwI93O/HxY4TPi9

Malware Config

Extracted

Family

redline

Botnet

dariy

C2

217.196.96.101:4132

Attributes
  • auth_value

    2f34aa0d1cb1023a826825b68ebedcc8

Targets

    • Target

      ed01a9e4034c2f42409a9bdcac9a3b3868b39b5becd8ac14ba93bdb6788234be

    • Size

      480KB

    • MD5

      1a0e267aec9b9ab473936c94c74c2ad7

    • SHA1

      a0953327b587d4b26991f06cb56d59dbbb6daf8a

    • SHA256

      ed01a9e4034c2f42409a9bdcac9a3b3868b39b5becd8ac14ba93bdb6788234be

    • SHA512

      426a4507cf078d4ad4e87001ce3c9bf58909566a877b9a3e2c7a9fd6b67217ae3c6c2ed55e116562369ffd78940e0624caf7baeadaf702b3abc47271ec454394

    • SSDEEP

      12288:NMrUy90ceYRL3MfanFwF69W0hP2/Hx8f4TPOT5L:1ygmLnFwI93O/HxY4TPi9

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks