General

  • Target

    265891f47f7e419fc274c7a8fb5bb1c10b6a5d1417ce54e8d84592d4f4fca671

  • Size

    480KB

  • Sample

    230508-zt9xpacg24

  • MD5

    9e6a2d125f93067a1c5f1e87a74b320d

  • SHA1

    3dcdf2029a2bdca40023028b5ed4b12bbebe0d3a

  • SHA256

    265891f47f7e419fc274c7a8fb5bb1c10b6a5d1417ce54e8d84592d4f4fca671

  • SHA512

    c735ec71485dae0097e746656d8c4c5d0189ee349330c9ca7d6d215a391857459bf57a54157e13102853ddfabe709062e317bb2485f9bff6c22ce914d945c18a

  • SSDEEP

    6144:KBy+bnr+gp0yN90QEYNVulSuHePC1gpqbJXPgNCY4lDeL7MDcxmuWl8hLHnqdoCi:jMrwy90+SKp4Jf8SDiMDcUeLCv3XBUN

Malware Config

Extracted

Family

redline

Botnet

dumud

C2

217.196.96.101:4132

Attributes
  • auth_value

    3e18d4b90418aa3e78d8822e87c62f5c

Targets

    • Target

      265891f47f7e419fc274c7a8fb5bb1c10b6a5d1417ce54e8d84592d4f4fca671

    • Size

      480KB

    • MD5

      9e6a2d125f93067a1c5f1e87a74b320d

    • SHA1

      3dcdf2029a2bdca40023028b5ed4b12bbebe0d3a

    • SHA256

      265891f47f7e419fc274c7a8fb5bb1c10b6a5d1417ce54e8d84592d4f4fca671

    • SHA512

      c735ec71485dae0097e746656d8c4c5d0189ee349330c9ca7d6d215a391857459bf57a54157e13102853ddfabe709062e317bb2485f9bff6c22ce914d945c18a

    • SSDEEP

      6144:KBy+bnr+gp0yN90QEYNVulSuHePC1gpqbJXPgNCY4lDeL7MDcxmuWl8hLHnqdoCi:jMrwy90+SKp4Jf8SDiMDcUeLCv3XBUN

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks