General

  • Target

    1bc8f7fe0f52fccb169b188af1d3294312bf25f0b0e05eaf00857cc5dbdf3a77

  • Size

    480KB

  • Sample

    230508-1prqzsef8w

  • MD5

    3dab5fd467632603f7450f1b5ecff32d

  • SHA1

    3979c5bc25fa17e1c1b09bfd6baff6fa092a5eb9

  • SHA256

    1bc8f7fe0f52fccb169b188af1d3294312bf25f0b0e05eaf00857cc5dbdf3a77

  • SHA512

    6d186a3b2631c57b13d78c651295af230273f7a437e0286656d109636598521f4bffb37aa165771fb63a8adf707d7f3b629450c9766ea6d2f9aced5c62073fb2

  • SSDEEP

    12288:UMrly90Di7/aL72I2Vmel4Nlx9CSqKwGDzzVnoG:Ry8gIqBmelalOSpbzVz

Malware Config

Extracted

Family

redline

Botnet

mihan

C2

217.196.96.101:4132

Attributes
  • auth_value

    9a6a8fdae02ed7caa0a49a6ddc6d4520

Targets

    • Target

      1bc8f7fe0f52fccb169b188af1d3294312bf25f0b0e05eaf00857cc5dbdf3a77

    • Size

      480KB

    • MD5

      3dab5fd467632603f7450f1b5ecff32d

    • SHA1

      3979c5bc25fa17e1c1b09bfd6baff6fa092a5eb9

    • SHA256

      1bc8f7fe0f52fccb169b188af1d3294312bf25f0b0e05eaf00857cc5dbdf3a77

    • SHA512

      6d186a3b2631c57b13d78c651295af230273f7a437e0286656d109636598521f4bffb37aa165771fb63a8adf707d7f3b629450c9766ea6d2f9aced5c62073fb2

    • SSDEEP

      12288:UMrly90Di7/aL72I2Vmel4Nlx9CSqKwGDzzVnoG:Ry8gIqBmelalOSpbzVz

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks