General

  • Target

    f51016b0b8a4dca44acda2d3c3f2336b514b5757a3bcb5214a0092aa64d9b3f1

  • Size

    479KB

  • Sample

    230508-vx6l8ade71

  • MD5

    54f6d73344fec2fa0d94e8959ebc5690

  • SHA1

    61b48fed891e0fcf0df3bc839225e5c8c7ce98bf

  • SHA256

    f51016b0b8a4dca44acda2d3c3f2336b514b5757a3bcb5214a0092aa64d9b3f1

  • SHA512

    13318e10cf2a698399d483e8c6ade1573b70ef0d10e6d77906679ad31a7093609227fbf286c49375dca1b7a71506fe7b84070671eb560e32e61776e0809c6f01

  • SSDEEP

    12288:pMrCy90Nty9aso16MX7kixgI63X3K+7p0UnQ:3yKty9k16MXXgId+VpQ

Malware Config

Extracted

Family

redline

Botnet

dona

C2

217.196.96.101:4132

Attributes
  • auth_value

    9fbb198992bbc83a84ab1f21384813e3

Targets

    • Target

      f51016b0b8a4dca44acda2d3c3f2336b514b5757a3bcb5214a0092aa64d9b3f1

    • Size

      479KB

    • MD5

      54f6d73344fec2fa0d94e8959ebc5690

    • SHA1

      61b48fed891e0fcf0df3bc839225e5c8c7ce98bf

    • SHA256

      f51016b0b8a4dca44acda2d3c3f2336b514b5757a3bcb5214a0092aa64d9b3f1

    • SHA512

      13318e10cf2a698399d483e8c6ade1573b70ef0d10e6d77906679ad31a7093609227fbf286c49375dca1b7a71506fe7b84070671eb560e32e61776e0809c6f01

    • SSDEEP

      12288:pMrCy90Nty9aso16MX7kixgI63X3K+7p0UnQ:3yKty9k16MXXgId+VpQ

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks