General

  • Target

    0ec534888925e664aa6023cf0ef1a38d136869c0de87c0601efc6c64c9de4a3c

  • Size

    479KB

  • Sample

    230508-kshdqabf31

  • MD5

    ff5d9ea6383516b1e2895ba9cc0aa950

  • SHA1

    5ad4065ebacf732898e6ea4e850ff94d7b22ea84

  • SHA256

    0ec534888925e664aa6023cf0ef1a38d136869c0de87c0601efc6c64c9de4a3c

  • SHA512

    0f304f8ee169d296c624b57ecb5372e69b4347a51dcfab2261aef9c9ff1a3c1d2d818f4ee2250f72ee43f5eb09ed40aff3ef29cfd682af7e2f456e03c10667d5

  • SSDEEP

    12288:NMrZy905W5I9h4NEmx+nNNu7TbRsCYT+rkcj:cyO9qNP+NNu7rLgO

Malware Config

Extracted

Family

redline

Botnet

ditro

C2

217.196.96.101:4132

Attributes
  • auth_value

    8f24ed370a9b24aa28d3d634ea57912e

Targets

    • Target

      0ec534888925e664aa6023cf0ef1a38d136869c0de87c0601efc6c64c9de4a3c

    • Size

      479KB

    • MD5

      ff5d9ea6383516b1e2895ba9cc0aa950

    • SHA1

      5ad4065ebacf732898e6ea4e850ff94d7b22ea84

    • SHA256

      0ec534888925e664aa6023cf0ef1a38d136869c0de87c0601efc6c64c9de4a3c

    • SHA512

      0f304f8ee169d296c624b57ecb5372e69b4347a51dcfab2261aef9c9ff1a3c1d2d818f4ee2250f72ee43f5eb09ed40aff3ef29cfd682af7e2f456e03c10667d5

    • SSDEEP

      12288:NMrZy905W5I9h4NEmx+nNNu7TbRsCYT+rkcj:cyO9qNP+NNu7rLgO

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks