General

  • Target

    6c677a3a34033f6e980d20290bd15a4ec3dc555b98864d824155f6afe8c12543

  • Size

    479KB

  • Sample

    230508-j16wlsbd5z

  • MD5

    097e14d63131add7d3cfca061149dc03

  • SHA1

    e9d670b6e33eabe0e7de9fe9f9a3ff62b93e7cb5

  • SHA256

    6c677a3a34033f6e980d20290bd15a4ec3dc555b98864d824155f6afe8c12543

  • SHA512

    3f564e2f70ddf0618fbb77bd490ba46e41c7e7ec6dcc5d0131c70f77b09b3e3a36676ddb712ee71e42b4e8efee93dffdda50be12ad75186237982a69d33cfcde

  • SSDEEP

    12288:MMroy90vjVJf1GPxEI5c1u315T9lOJKjE05iyMh+:EyYhJf1GZXfTzAc52h+

Malware Config

Extracted

Family

redline

Botnet

ditro

C2

217.196.96.101:4132

Attributes
  • auth_value

    8f24ed370a9b24aa28d3d634ea57912e

Targets

    • Target

      6c677a3a34033f6e980d20290bd15a4ec3dc555b98864d824155f6afe8c12543

    • Size

      479KB

    • MD5

      097e14d63131add7d3cfca061149dc03

    • SHA1

      e9d670b6e33eabe0e7de9fe9f9a3ff62b93e7cb5

    • SHA256

      6c677a3a34033f6e980d20290bd15a4ec3dc555b98864d824155f6afe8c12543

    • SHA512

      3f564e2f70ddf0618fbb77bd490ba46e41c7e7ec6dcc5d0131c70f77b09b3e3a36676ddb712ee71e42b4e8efee93dffdda50be12ad75186237982a69d33cfcde

    • SSDEEP

      12288:MMroy90vjVJf1GPxEI5c1u315T9lOJKjE05iyMh+:EyYhJf1GZXfTzAc52h+

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks