General

  • Target

    8bbaa36dd1b3b7298167c143d285e319b886adac33ea0d0c9c8156d836d0224e

  • Size

    481KB

  • Sample

    230507-sp9mssgg7t

  • MD5

    98c8595ece67bbabbf4f48b590ef5022

  • SHA1

    620fedcd3d3f8f9a6b063e728410ed57d13e48b6

  • SHA256

    8bbaa36dd1b3b7298167c143d285e319b886adac33ea0d0c9c8156d836d0224e

  • SHA512

    fb9d514c6b80287230c79fcae816fdf9b183f22516b2258d7123b0374e61d6077df47a72f7e90b650630dcc97cbc5388e338027d08aa7085e197615019baa846

  • SSDEEP

    12288:7Mrby90ZTTU1dn5zK96HgDSAdtNcg0XOsVo:MyM8pADSev0+sVo

Malware Config

Extracted

Family

redline

Botnet

misfa

C2

217.196.96.101:4132

Attributes
  • auth_value

    be2e6d9f1a5e54a81340947b20e561c1

Targets

    • Target

      8bbaa36dd1b3b7298167c143d285e319b886adac33ea0d0c9c8156d836d0224e

    • Size

      481KB

    • MD5

      98c8595ece67bbabbf4f48b590ef5022

    • SHA1

      620fedcd3d3f8f9a6b063e728410ed57d13e48b6

    • SHA256

      8bbaa36dd1b3b7298167c143d285e319b886adac33ea0d0c9c8156d836d0224e

    • SHA512

      fb9d514c6b80287230c79fcae816fdf9b183f22516b2258d7123b0374e61d6077df47a72f7e90b650630dcc97cbc5388e338027d08aa7085e197615019baa846

    • SSDEEP

      12288:7Mrby90ZTTU1dn5zK96HgDSAdtNcg0XOsVo:MyM8pADSev0+sVo

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks