General

  • Target

    d722f400016a58fd1d6874f5b43deeb85076c43007618eb51dae16ae20f0f74c

  • Size

    480KB

  • Sample

    230507-rxzxwsfa22

  • MD5

    475511e481cc6e1d8d20f06469a75698

  • SHA1

    4764faf4ee6ce6ce67284ebcd0c968d4d8ab58ac

  • SHA256

    d722f400016a58fd1d6874f5b43deeb85076c43007618eb51dae16ae20f0f74c

  • SHA512

    e3b07ee06ddc75ec1565e8287faed7b7d86d5bb3562a5a1d66c8bf4716f2b8a61d1a8edae8fad9c563d777ddeefaad3ffef7822822c4ca74dac706908898b816

  • SSDEEP

    12288:rMrJey90LBuUp7U65c1u316TPN5gtaYe:UeysBuUp7nXsTie

Malware Config

Extracted

Family

redline

Botnet

misfa

C2

217.196.96.101:4132

Attributes
  • auth_value

    be2e6d9f1a5e54a81340947b20e561c1

Targets

    • Target

      d722f400016a58fd1d6874f5b43deeb85076c43007618eb51dae16ae20f0f74c

    • Size

      480KB

    • MD5

      475511e481cc6e1d8d20f06469a75698

    • SHA1

      4764faf4ee6ce6ce67284ebcd0c968d4d8ab58ac

    • SHA256

      d722f400016a58fd1d6874f5b43deeb85076c43007618eb51dae16ae20f0f74c

    • SHA512

      e3b07ee06ddc75ec1565e8287faed7b7d86d5bb3562a5a1d66c8bf4716f2b8a61d1a8edae8fad9c563d777ddeefaad3ffef7822822c4ca74dac706908898b816

    • SSDEEP

      12288:rMrJey90LBuUp7U65c1u316TPN5gtaYe:UeysBuUp7nXsTie

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks