General

  • Target

    feea05064f033ac2caed7de11cbc96ee68dbeba8a562f52b49907f87b7ed5d7c

  • Size

    480KB

  • Sample

    230507-vd5wksha3z

  • MD5

    3b6c8700498e111477ab2c1cda4804a6

  • SHA1

    396ce3e5b2ca8119b2adaf94455237d5c20ad7be

  • SHA256

    feea05064f033ac2caed7de11cbc96ee68dbeba8a562f52b49907f87b7ed5d7c

  • SHA512

    d61143aefc3c216e722a169e501769b89a1b33be6d5bb34bc09aa10c92cbede92d27dcf3f319360ab55fb15e4b4a18338dae268c5b9cc3af345d83cd4ecf8283

  • SSDEEP

    6144:K2y+bnr+Ip0yN90QEwyJh1PRmHePCQN5D23HFjxqy61Dsu5OKXXD3rG7GyCeBkp1:KMr4y90C+h1PRmSIL61su4KjCqNb0L8

Malware Config

Extracted

Family

redline

Botnet

misfa

C2

217.196.96.101:4132

Attributes
  • auth_value

    be2e6d9f1a5e54a81340947b20e561c1

Targets

    • Target

      feea05064f033ac2caed7de11cbc96ee68dbeba8a562f52b49907f87b7ed5d7c

    • Size

      480KB

    • MD5

      3b6c8700498e111477ab2c1cda4804a6

    • SHA1

      396ce3e5b2ca8119b2adaf94455237d5c20ad7be

    • SHA256

      feea05064f033ac2caed7de11cbc96ee68dbeba8a562f52b49907f87b7ed5d7c

    • SHA512

      d61143aefc3c216e722a169e501769b89a1b33be6d5bb34bc09aa10c92cbede92d27dcf3f319360ab55fb15e4b4a18338dae268c5b9cc3af345d83cd4ecf8283

    • SSDEEP

      6144:K2y+bnr+Ip0yN90QEwyJh1PRmHePCQN5D23HFjxqy61Dsu5OKXXD3rG7GyCeBkp1:KMr4y90C+h1PRmSIL61su4KjCqNb0L8

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks