General

  • Target

    1525bc7644ae3ff83d7cafb75dffaf18d847e0f3652cf1ec1636df4bc49e449c

  • Size

    479KB

  • Sample

    230509-ptqtpsfh37

  • MD5

    7d92ac0444146dcdffe198e1f15c99a9

  • SHA1

    aeb5b436c272aa3440a1f9a80ffeb96bd4b484d7

  • SHA256

    1525bc7644ae3ff83d7cafb75dffaf18d847e0f3652cf1ec1636df4bc49e449c

  • SHA512

    2c5c7ee1bc1032fe833cad613bfe88821dff55cc9d93dfa9f6d7cc024471a954e104f6d354990c0b96413c606e67cfd04109a98cb3fcfb4633403a7cb8e0a93d

  • SSDEEP

    12288:JMrWy90lNlWVZqaITX5cC1Pr4mlZr8lej:PyXqaIT9z8lej

Malware Config

Extracted

Family

redline

Botnet

douma

C2

217.196.96.101:4132

Attributes
  • auth_value

    e7c0659b5f9d26f2f97df8d25fefbb44

Targets

    • Target

      1525bc7644ae3ff83d7cafb75dffaf18d847e0f3652cf1ec1636df4bc49e449c

    • Size

      479KB

    • MD5

      7d92ac0444146dcdffe198e1f15c99a9

    • SHA1

      aeb5b436c272aa3440a1f9a80ffeb96bd4b484d7

    • SHA256

      1525bc7644ae3ff83d7cafb75dffaf18d847e0f3652cf1ec1636df4bc49e449c

    • SHA512

      2c5c7ee1bc1032fe833cad613bfe88821dff55cc9d93dfa9f6d7cc024471a954e104f6d354990c0b96413c606e67cfd04109a98cb3fcfb4633403a7cb8e0a93d

    • SSDEEP

      12288:JMrWy90lNlWVZqaITX5cC1Pr4mlZr8lej:PyXqaIT9z8lej

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks