General

  • Target

    0e444812d320ce90017caa99991a53b4ae9db78e43177216086d78e0c31bfbab

  • Size

    480KB

  • Sample

    230509-nfnlrafe67

  • MD5

    c11841f60fe32869c285780d87ac21ac

  • SHA1

    19d26c2c0d1c3c832d0c1b99e9a6e7e9a8f134aa

  • SHA256

    0e444812d320ce90017caa99991a53b4ae9db78e43177216086d78e0c31bfbab

  • SHA512

    da929590a74494750df7f665545b768be5e9e8b98abf10f16eef239f5dab21d919b97bbaef22ca8dda40332f7255c48be65edf35e5325fccee2d67765edab754

  • SSDEEP

    12288:OMr4y90egDD7i+zAaQT4fDdPS27FZzYx:Cyr+s5kfD9S27FZA

Malware Config

Extracted

Family

redline

Botnet

douma

C2

217.196.96.101:4132

Attributes
  • auth_value

    e7c0659b5f9d26f2f97df8d25fefbb44

Targets

    • Target

      0e444812d320ce90017caa99991a53b4ae9db78e43177216086d78e0c31bfbab

    • Size

      480KB

    • MD5

      c11841f60fe32869c285780d87ac21ac

    • SHA1

      19d26c2c0d1c3c832d0c1b99e9a6e7e9a8f134aa

    • SHA256

      0e444812d320ce90017caa99991a53b4ae9db78e43177216086d78e0c31bfbab

    • SHA512

      da929590a74494750df7f665545b768be5e9e8b98abf10f16eef239f5dab21d919b97bbaef22ca8dda40332f7255c48be65edf35e5325fccee2d67765edab754

    • SSDEEP

      12288:OMr4y90egDD7i+zAaQT4fDdPS27FZzYx:Cyr+s5kfD9S27FZA

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks