General

  • Target

    3cd43d5d7e701a6e0453a4a1efcc193b190392a57907d5abe90c2b22e0dd8354

  • Size

    479KB

  • Sample

    230509-mr7ckafd67

  • MD5

    f329ee3e014f9cef897f46b5070516b8

  • SHA1

    5319efe2e21408297d03cca20aff3ad74a731de8

  • SHA256

    3cd43d5d7e701a6e0453a4a1efcc193b190392a57907d5abe90c2b22e0dd8354

  • SHA512

    baa8174f3ce54cab6d01a1100a1afcbcde0c2539e3f05938b897cd03692e14ee85a314cc9f9fa915cee339bc0008de7ef81a48303765e6172c5d2546fb7a90fc

  • SSDEEP

    12288:eMrey90/AD5vb3zwpTaTl5WpIcBbAoZRRFW0qoJy1:0yhtzZTvob5RH1qoJs

Malware Config

Extracted

Family

redline

Botnet

douma

C2

217.196.96.101:4132

Attributes
  • auth_value

    e7c0659b5f9d26f2f97df8d25fefbb44

Targets

    • Target

      3cd43d5d7e701a6e0453a4a1efcc193b190392a57907d5abe90c2b22e0dd8354

    • Size

      479KB

    • MD5

      f329ee3e014f9cef897f46b5070516b8

    • SHA1

      5319efe2e21408297d03cca20aff3ad74a731de8

    • SHA256

      3cd43d5d7e701a6e0453a4a1efcc193b190392a57907d5abe90c2b22e0dd8354

    • SHA512

      baa8174f3ce54cab6d01a1100a1afcbcde0c2539e3f05938b897cd03692e14ee85a314cc9f9fa915cee339bc0008de7ef81a48303765e6172c5d2546fb7a90fc

    • SSDEEP

      12288:eMrey90/AD5vb3zwpTaTl5WpIcBbAoZRRFW0qoJy1:0yhtzZTvob5RH1qoJs

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks