General

  • Target

    55803e6f81d29f8e1c8b6827e57e427b2d46cabb626d293df71cc7ccf1668dc2

  • Size

    479KB

  • Sample

    230507-x3mgmshd3v

  • MD5

    c9ba1c4bf69ffe605bcb2e2bb4875d97

  • SHA1

    93ad137e8299e62a30472251a58632b224755e31

  • SHA256

    55803e6f81d29f8e1c8b6827e57e427b2d46cabb626d293df71cc7ccf1668dc2

  • SHA512

    7803face9403d6fbfe666bf3543007f8ed4529c26e72f2ef463b775182f98c088caf7295c850fbfc3274ef04ace53ace8332eea26ea93103a1715c718d3396e4

  • SSDEEP

    12288:kMrMy90RglI7BW42HbiaxpRFEARBuk0R2S47:wyuXtWLbtxGmBukOs

Malware Config

Extracted

Family

redline

Botnet

dion

C2

217.196.96.101:4132

Attributes
  • auth_value

    6e0b6a3255923968b15f61a2c040c5c9

Targets

    • Target

      55803e6f81d29f8e1c8b6827e57e427b2d46cabb626d293df71cc7ccf1668dc2

    • Size

      479KB

    • MD5

      c9ba1c4bf69ffe605bcb2e2bb4875d97

    • SHA1

      93ad137e8299e62a30472251a58632b224755e31

    • SHA256

      55803e6f81d29f8e1c8b6827e57e427b2d46cabb626d293df71cc7ccf1668dc2

    • SHA512

      7803face9403d6fbfe666bf3543007f8ed4529c26e72f2ef463b775182f98c088caf7295c850fbfc3274ef04ace53ace8332eea26ea93103a1715c718d3396e4

    • SSDEEP

      12288:kMrMy90RglI7BW42HbiaxpRFEARBuk0R2S47:wyuXtWLbtxGmBukOs

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks