General

  • Target

    33c9f1d2a959124a0df767db4737f153b261d7c5fb46449a1cff78cd3d17162e

  • Size

    481KB

  • Sample

    230507-yelqwaff44

  • MD5

    b3de4a2ae58158d9992d627c5832956d

  • SHA1

    5a4e82ddd07a5a233c9d7e4c204cd3d494302a27

  • SHA256

    33c9f1d2a959124a0df767db4737f153b261d7c5fb46449a1cff78cd3d17162e

  • SHA512

    ef9ee030c178eb8b8e9ef223b01cb0b3d78a1db60e0deefa9711365e707521c165c4edbe1c232902ee97d1554c855c9093eaa354af0cb940f6c710a17cc37d93

  • SSDEEP

    12288:oMrTy90lsfQRan8AZ6cZG1PwjLXvvJJiDrTjqWjRGdNb6:7y9X+cuwfvvz8LBRG7O

Malware Config

Extracted

Family

redline

Botnet

misar

C2

217.196.96.101:4132

Attributes
  • auth_value

    069dd9eeee8cff502b661416888f692a

Targets

    • Target

      33c9f1d2a959124a0df767db4737f153b261d7c5fb46449a1cff78cd3d17162e

    • Size

      481KB

    • MD5

      b3de4a2ae58158d9992d627c5832956d

    • SHA1

      5a4e82ddd07a5a233c9d7e4c204cd3d494302a27

    • SHA256

      33c9f1d2a959124a0df767db4737f153b261d7c5fb46449a1cff78cd3d17162e

    • SHA512

      ef9ee030c178eb8b8e9ef223b01cb0b3d78a1db60e0deefa9711365e707521c165c4edbe1c232902ee97d1554c855c9093eaa354af0cb940f6c710a17cc37d93

    • SSDEEP

      12288:oMrTy90lsfQRan8AZ6cZG1PwjLXvvJJiDrTjqWjRGdNb6:7y9X+cuwfvvz8LBRG7O

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks