General

  • Target

    2e906e6df0205ab4b363be37710d01c5c02eea9e0b122810bdac1dafb8342be2

  • Size

    480KB

  • Sample

    230509-pcafdsfg35

  • MD5

    3ec4dcb6ff2b75b418c6b8603daeb567

  • SHA1

    a3ac53cd13e32e621da5cecf99aad340b676d7b1

  • SHA256

    2e906e6df0205ab4b363be37710d01c5c02eea9e0b122810bdac1dafb8342be2

  • SHA512

    74ae479409f5256497c609dcb4a6cfb4bcebe38cd70057b627996e858ddad22a40c6545bb9dc6366954831ea539de8779baef47279a927a5fcdfd9205840c2eb

  • SSDEEP

    12288:ZMrNy90jw+9m5Y75c1u31nTYClajCiMZ8ncR26p:0y81goX1T9la+iMkO

Malware Config

Extracted

Family

redline

Botnet

douma

C2

217.196.96.101:4132

Attributes
  • auth_value

    e7c0659b5f9d26f2f97df8d25fefbb44

Targets

    • Target

      2e906e6df0205ab4b363be37710d01c5c02eea9e0b122810bdac1dafb8342be2

    • Size

      480KB

    • MD5

      3ec4dcb6ff2b75b418c6b8603daeb567

    • SHA1

      a3ac53cd13e32e621da5cecf99aad340b676d7b1

    • SHA256

      2e906e6df0205ab4b363be37710d01c5c02eea9e0b122810bdac1dafb8342be2

    • SHA512

      74ae479409f5256497c609dcb4a6cfb4bcebe38cd70057b627996e858ddad22a40c6545bb9dc6366954831ea539de8779baef47279a927a5fcdfd9205840c2eb

    • SSDEEP

      12288:ZMrNy90jw+9m5Y75c1u31nTYClajCiMZ8ncR26p:0y81goX1T9la+iMkO

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks