General

  • Target

    978ad272b1935b3b234281e492f9aac08980f6892a7f2e98962802d41ff4fad3

  • Size

    479KB

  • Sample

    230508-dtcfjaaf4x

  • MD5

    0cff4f47d3425dce29f0ca142cb09cef

  • SHA1

    53213064ef87c92d5bbe5a98ef7585cfca31b729

  • SHA256

    978ad272b1935b3b234281e492f9aac08980f6892a7f2e98962802d41ff4fad3

  • SHA512

    827b180a2fc0679e50e9ef664e20d44633bdbdff142c4dd142638657e8f00229bccd4aa251e5eb72008d85c3c9b7d18e20236c48a93270fccf27e20c4c330354

  • SSDEEP

    12288:UMrpy90nFAgShrqjGkmMglcrRQ6aIX9locEMBcL:dyUugEcVclW59i5L

Malware Config

Extracted

Family

redline

Botnet

morty

C2

217.196.96.101:4132

Attributes
  • auth_value

    fe1a24c211cc8e5bf9ff11c737ce0e97

Targets

    • Target

      978ad272b1935b3b234281e492f9aac08980f6892a7f2e98962802d41ff4fad3

    • Size

      479KB

    • MD5

      0cff4f47d3425dce29f0ca142cb09cef

    • SHA1

      53213064ef87c92d5bbe5a98ef7585cfca31b729

    • SHA256

      978ad272b1935b3b234281e492f9aac08980f6892a7f2e98962802d41ff4fad3

    • SHA512

      827b180a2fc0679e50e9ef664e20d44633bdbdff142c4dd142638657e8f00229bccd4aa251e5eb72008d85c3c9b7d18e20236c48a93270fccf27e20c4c330354

    • SSDEEP

      12288:UMrpy90nFAgShrqjGkmMglcrRQ6aIX9locEMBcL:dyUugEcVclW59i5L

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks