General

  • Target

    ab8d63bded5df52b21fa8da72af7c6b1e2bd467db41007f5783efa9a28a543a6

  • Size

    479KB

  • Sample

    230507-3bvltshh9y

  • MD5

    d02c89b40759c620b7c0cfa220e1eeb4

  • SHA1

    6f60d321eb8ebde6a2770bf71347dd3c57702960

  • SHA256

    ab8d63bded5df52b21fa8da72af7c6b1e2bd467db41007f5783efa9a28a543a6

  • SHA512

    d4d0df4fef022bb5151f2ec7914431e20fa657d488ae97ce9507eee6507139616d32b7f3057f591015953a818cb299a69c179ccfe21d287c9676ae580b41d742

  • SSDEEP

    12288:QMrOy90hsujYVZ/ThZ/nUmqHHApZtO3Rjc2:OyxvlZ/nFv9C

Malware Config

Extracted

Family

redline

Botnet

ditro

C2

217.196.96.101:4132

Attributes
  • auth_value

    8f24ed370a9b24aa28d3d634ea57912e

Targets

    • Target

      ab8d63bded5df52b21fa8da72af7c6b1e2bd467db41007f5783efa9a28a543a6

    • Size

      479KB

    • MD5

      d02c89b40759c620b7c0cfa220e1eeb4

    • SHA1

      6f60d321eb8ebde6a2770bf71347dd3c57702960

    • SHA256

      ab8d63bded5df52b21fa8da72af7c6b1e2bd467db41007f5783efa9a28a543a6

    • SHA512

      d4d0df4fef022bb5151f2ec7914431e20fa657d488ae97ce9507eee6507139616d32b7f3057f591015953a818cb299a69c179ccfe21d287c9676ae580b41d742

    • SSDEEP

      12288:QMrOy90hsujYVZ/ThZ/nUmqHHApZtO3Rjc2:OyxvlZ/nFv9C

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks