General

  • Target

    96d82dae4c7262c955341cc4da136253df03785feb9d3135c55a8f78420d25e0

  • Size

    479KB

  • Sample

    230508-df71aagg47

  • MD5

    35c6f323cc5a858d0a75d8003e92f292

  • SHA1

    77e95401d6061489c5fa0ccd4371058d6a3a05e5

  • SHA256

    96d82dae4c7262c955341cc4da136253df03785feb9d3135c55a8f78420d25e0

  • SHA512

    752ce06f2ff440c17d4a0182ca465e46683f9e047fac54bd2b3b14d722525c27bb1916fa4e3c3df1b82e43237feebf57a963d35f993150d6caeb3707b6e02f15

  • SSDEEP

    12288:zMrSy90qO4876w079HDccEg6y6OGeYnLyQ7E7M:ByD84xDP6y6OGUcN

Malware Config

Extracted

Family

redline

Botnet

ditro

C2

217.196.96.101:4132

Attributes
  • auth_value

    8f24ed370a9b24aa28d3d634ea57912e

Targets

    • Target

      96d82dae4c7262c955341cc4da136253df03785feb9d3135c55a8f78420d25e0

    • Size

      479KB

    • MD5

      35c6f323cc5a858d0a75d8003e92f292

    • SHA1

      77e95401d6061489c5fa0ccd4371058d6a3a05e5

    • SHA256

      96d82dae4c7262c955341cc4da136253df03785feb9d3135c55a8f78420d25e0

    • SHA512

      752ce06f2ff440c17d4a0182ca465e46683f9e047fac54bd2b3b14d722525c27bb1916fa4e3c3df1b82e43237feebf57a963d35f993150d6caeb3707b6e02f15

    • SSDEEP

      12288:zMrSy90qO4876w079HDccEg6y6OGeYnLyQ7E7M:ByD84xDP6y6OGUcN

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks