General

  • Target

    5968d10db7457b393cf03dccae8dad030da700b1a7e59f76d390b0d795bad5ea

  • Size

    479KB

  • Sample

    230509-e8a2pagb3t

  • MD5

    50bb2496665a1bc31f60424493ddc125

  • SHA1

    384d400251cb1de9d8ee5baf77c8bc4a41ce8559

  • SHA256

    5968d10db7457b393cf03dccae8dad030da700b1a7e59f76d390b0d795bad5ea

  • SHA512

    b06440ba3eb23cac9b9abed9f1c91c132f03af453be00c15b103a2af47443c6a06b7e75c93c70b84a5b12447e5d882585426beed354ac5a26ff100bebfb8d89f

  • SSDEEP

    12288:sMrHy90RQ5at0F3eZHjWXipOm6LbE52qKa6Z:by2QItNZDWXipOrbEKa6Z

Malware Config

Extracted

Family

redline

Botnet

dumud

C2

217.196.96.101:4132

Attributes
  • auth_value

    3e18d4b90418aa3e78d8822e87c62f5c

Targets

    • Target

      5968d10db7457b393cf03dccae8dad030da700b1a7e59f76d390b0d795bad5ea

    • Size

      479KB

    • MD5

      50bb2496665a1bc31f60424493ddc125

    • SHA1

      384d400251cb1de9d8ee5baf77c8bc4a41ce8559

    • SHA256

      5968d10db7457b393cf03dccae8dad030da700b1a7e59f76d390b0d795bad5ea

    • SHA512

      b06440ba3eb23cac9b9abed9f1c91c132f03af453be00c15b103a2af47443c6a06b7e75c93c70b84a5b12447e5d882585426beed354ac5a26ff100bebfb8d89f

    • SSDEEP

      12288:sMrHy90RQ5at0F3eZHjWXipOm6LbE52qKa6Z:by2QItNZDWXipOrbEKa6Z

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks