General

  • Target

    41a11b259675a719925908109c63dccf36801253e2d86259ad8f3390ebbf87a5

  • Size

    480KB

  • Sample

    230507-v9bmlsfc92

  • MD5

    992c91e809ea2953994ac005425b8a22

  • SHA1

    43c64ecebac523c982a162f5adf80b99d360f73e

  • SHA256

    41a11b259675a719925908109c63dccf36801253e2d86259ad8f3390ebbf87a5

  • SHA512

    c2d160c0d0da26fdb5d6ab6bf73929f85861f3e749a8a8c23d29ac7a64281f63500643072d09e64db2a621f5b4a0f7b6457372400f4e9744a3002f28d07e704e

  • SSDEEP

    12288:cMrfy90O9dyaATZVv0zRkhrN/5UvsUVD7c:byZgTjhr7UZB7c

Malware Config

Extracted

Family

redline

Botnet

misar

C2

217.196.96.101:4132

Attributes
  • auth_value

    069dd9eeee8cff502b661416888f692a

Targets

    • Target

      41a11b259675a719925908109c63dccf36801253e2d86259ad8f3390ebbf87a5

    • Size

      480KB

    • MD5

      992c91e809ea2953994ac005425b8a22

    • SHA1

      43c64ecebac523c982a162f5adf80b99d360f73e

    • SHA256

      41a11b259675a719925908109c63dccf36801253e2d86259ad8f3390ebbf87a5

    • SHA512

      c2d160c0d0da26fdb5d6ab6bf73929f85861f3e749a8a8c23d29ac7a64281f63500643072d09e64db2a621f5b4a0f7b6457372400f4e9744a3002f28d07e704e

    • SSDEEP

      12288:cMrfy90O9dyaATZVv0zRkhrN/5UvsUVD7c:byZgTjhr7UZB7c

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks