General

  • Target

    129ce092233cf84c9d7803ccdf18b8d0db7aa74617fada156cdc4d566267e8ef

  • Size

    479KB

  • Sample

    230508-qqt8dsah28

  • MD5

    1bca64fe6ac7e87952af3a013cbab927

  • SHA1

    1c9ceeff7df8ee11682cb08827d6ed843277a39b

  • SHA256

    129ce092233cf84c9d7803ccdf18b8d0db7aa74617fada156cdc4d566267e8ef

  • SHA512

    0df1cddce121872dede16a6971a11f349c48043f6b00481b3744323bf902d55be86345047f6854a75ff50781cd7b2d5f932093071b4e1224f412354a96fc6d4e

  • SSDEEP

    12288:+MrDy90ReOWN02sZ9x7soKve3NyleXktIiXjC:VyIeOiFsZ9xrK8Nyl1tTjC

Malware Config

Extracted

Family

redline

Botnet

maher

C2

217.196.96.101:4132

Attributes
  • auth_value

    c57763165f68aabcf4874e661a1ffbac

Targets

    • Target

      129ce092233cf84c9d7803ccdf18b8d0db7aa74617fada156cdc4d566267e8ef

    • Size

      479KB

    • MD5

      1bca64fe6ac7e87952af3a013cbab927

    • SHA1

      1c9ceeff7df8ee11682cb08827d6ed843277a39b

    • SHA256

      129ce092233cf84c9d7803ccdf18b8d0db7aa74617fada156cdc4d566267e8ef

    • SHA512

      0df1cddce121872dede16a6971a11f349c48043f6b00481b3744323bf902d55be86345047f6854a75ff50781cd7b2d5f932093071b4e1224f412354a96fc6d4e

    • SSDEEP

      12288:+MrDy90ReOWN02sZ9x7soKve3NyleXktIiXjC:VyIeOiFsZ9xrK8Nyl1tTjC

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks