General

  • Target

    79c788d17c5e6b7f77c09b778d1fff5c4b040a3d3fcba2128e778587712eed24

  • Size

    479KB

  • Sample

    230508-cc2tesge87

  • MD5

    363b007e5f5694ee8a8613683869e769

  • SHA1

    ba53965917cc335abb9d2c69ea17421ee7a453c1

  • SHA256

    79c788d17c5e6b7f77c09b778d1fff5c4b040a3d3fcba2128e778587712eed24

  • SHA512

    91ac4016b6dfafe6b2fe61eedb95e8d217d102f04ec53e27ffb511921969d51e64a46b531ad71a57602ffbf2a649596e438c5cc7e0e068fcca6c297d2ad9d99d

  • SSDEEP

    12288:sMrwy90EfSLdUKiukVUogxbSaIXi0jkYe//n7:cymdUKirUpBS5TkYKz

Malware Config

Extracted

Family

redline

Botnet

morty

C2

217.196.96.101:4132

Attributes
  • auth_value

    fe1a24c211cc8e5bf9ff11c737ce0e97

Targets

    • Target

      79c788d17c5e6b7f77c09b778d1fff5c4b040a3d3fcba2128e778587712eed24

    • Size

      479KB

    • MD5

      363b007e5f5694ee8a8613683869e769

    • SHA1

      ba53965917cc335abb9d2c69ea17421ee7a453c1

    • SHA256

      79c788d17c5e6b7f77c09b778d1fff5c4b040a3d3fcba2128e778587712eed24

    • SHA512

      91ac4016b6dfafe6b2fe61eedb95e8d217d102f04ec53e27ffb511921969d51e64a46b531ad71a57602ffbf2a649596e438c5cc7e0e068fcca6c297d2ad9d99d

    • SSDEEP

      12288:sMrwy90EfSLdUKiukVUogxbSaIXi0jkYe//n7:cymdUKirUpBS5TkYKz

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks