General

  • Target

    4e261c7a3c85f6c320e82be4d2ea0d2fabc90ae4e2d905504768c4bad441d6ff

  • Size

    481KB

  • Sample

    230509-j23wcagg91

  • MD5

    dd974ca5d34efa9bcf912447f6ef3b43

  • SHA1

    b6b04798fab704181beb9f247602022d269bba9d

  • SHA256

    4e261c7a3c85f6c320e82be4d2ea0d2fabc90ae4e2d905504768c4bad441d6ff

  • SHA512

    def5f6aa1d88293c1b096c9109448f486b127324bdc53d9b0e3d2ac7f78869cb86827dc7cbae9e7582592f610d213d09be52f494d362b20251240008dfa14313

  • SSDEEP

    12288:kMr6y90yVP53Ba/cXX3qvuKaHyWy9qGTOWcI/i:2yQB+y9LTOr

Malware Config

Extracted

Family

redline

Botnet

douma

C2

217.196.96.101:4132

Attributes
  • auth_value

    e7c0659b5f9d26f2f97df8d25fefbb44

Targets

    • Target

      4e261c7a3c85f6c320e82be4d2ea0d2fabc90ae4e2d905504768c4bad441d6ff

    • Size

      481KB

    • MD5

      dd974ca5d34efa9bcf912447f6ef3b43

    • SHA1

      b6b04798fab704181beb9f247602022d269bba9d

    • SHA256

      4e261c7a3c85f6c320e82be4d2ea0d2fabc90ae4e2d905504768c4bad441d6ff

    • SHA512

      def5f6aa1d88293c1b096c9109448f486b127324bdc53d9b0e3d2ac7f78869cb86827dc7cbae9e7582592f610d213d09be52f494d362b20251240008dfa14313

    • SSDEEP

      12288:kMr6y90yVP53Ba/cXX3qvuKaHyWy9qGTOWcI/i:2yQB+y9LTOr

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks