General

  • Target

    586d154945f9e69b400907668f31e9ad3bb5f88c0add876d1f477d6faa6e50ff

  • Size

    479KB

  • Sample

    230508-dxnyqsaf5v

  • MD5

    9754a749969e0ce081fb15dcb6e58906

  • SHA1

    e58892f14a7199c9204f9703fc627ece837b88d2

  • SHA256

    586d154945f9e69b400907668f31e9ad3bb5f88c0add876d1f477d6faa6e50ff

  • SHA512

    136dac28a827730fbde5979607036019a18df37cbec2666b279267a338f14f57fb682eaedfcde91c3639e5392ca22d42fff778cb9574f0f2c2d0947f4123e569

  • SSDEEP

    12288:IMrcy90OVWK9rXwfgpWxdTfwEZUz1tw7fZIbeqns5:EyBV1WDrU5t2ZCs5

Malware Config

Extracted

Family

redline

Botnet

ditro

C2

217.196.96.101:4132

Attributes
  • auth_value

    8f24ed370a9b24aa28d3d634ea57912e

Targets

    • Target

      586d154945f9e69b400907668f31e9ad3bb5f88c0add876d1f477d6faa6e50ff

    • Size

      479KB

    • MD5

      9754a749969e0ce081fb15dcb6e58906

    • SHA1

      e58892f14a7199c9204f9703fc627ece837b88d2

    • SHA256

      586d154945f9e69b400907668f31e9ad3bb5f88c0add876d1f477d6faa6e50ff

    • SHA512

      136dac28a827730fbde5979607036019a18df37cbec2666b279267a338f14f57fb682eaedfcde91c3639e5392ca22d42fff778cb9574f0f2c2d0947f4123e569

    • SSDEEP

      12288:IMrcy90OVWK9rXwfgpWxdTfwEZUz1tw7fZIbeqns5:EyBV1WDrU5t2ZCs5

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks