General

  • Target

    d5b603d600d6d00ae38cab11c0700ef2.bin

  • Size

    435KB

  • Sample

    230508-b9y85age77

  • MD5

    62fb435465697bd37f8e39e91d3887d1

  • SHA1

    a88e7b74573aa845a4cd7f0cdee55f9e41ee5b9c

  • SHA256

    2d58bf46256d9957dd508fa2e295dca25ac4ffef09599523b79d4a968cb56bf5

  • SHA512

    32261b21cd97d41f5e790f33ddb1934e9b0062a7a04cd7c3e48906f8b88c796785643bc2a8712255c65072d4041abe42f5efdb748befdd6745508e001cdb0758

  • SSDEEP

    6144:KkcpI/cbb0C7m/a8n1zKTCgCL7cfXtxXQORFGhYGHUeslvN9kZy1mlJw9zkkv+pD:KkU8iuOTnfXvAOedHoRNyaE+Hv+mpX9W

Malware Config

Extracted

Family

redline

Botnet

dariy

C2

217.196.96.101:4132

Attributes
  • auth_value

    2f34aa0d1cb1023a826825b68ebedcc8

Targets

    • Target

      5d20c911a61ca2afc8f3cba61d942e3d45a563626d87742e1b30c13519f61b33.exe

    • Size

      479KB

    • MD5

      d5b603d600d6d00ae38cab11c0700ef2

    • SHA1

      0227afab9718a9f07a267155296f7cb1265077d8

    • SHA256

      5d20c911a61ca2afc8f3cba61d942e3d45a563626d87742e1b30c13519f61b33

    • SHA512

      d05f4452a86c8fbd2a5f431c532366e2df0b3179c198c06537c7b795c8dab96943fe7a1a1efe16163998b10faa9bebbe039089a92013e2d748adb4957dbb21a7

    • SSDEEP

      12288:yMrGy90DceqXfV6pnGb5c1u317Toqf73raeg+v67cON:Ay/eefV2GFXZTjDeegbwON

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks