General

  • Target

    27bb642e143ca5d3caa6fb8749422eff329b23f4df555ecff20e10cff671b714

  • Size

    481KB

  • Sample

    230509-qd79gshh5t

  • MD5

    eb360636bff9a988424eba037dd44a5e

  • SHA1

    aa386b492d18d0edb704976417ac1342da6dc2c2

  • SHA256

    27bb642e143ca5d3caa6fb8749422eff329b23f4df555ecff20e10cff671b714

  • SHA512

    7ed16cb2f339ba95ed75fe26a14d15d2bbf6126f5b2488a7c8a8139f54b0a5091776a0046b5393acc87bf48aeb0dd0ef6932a936604f66d76ae015eea0fa4e96

  • SSDEEP

    12288:SMryy90PD3BpBiukGmcz0ZvorVcLtKO0:QyED3hkB5orOw5

Malware Config

Extracted

Family

redline

Botnet

mofun

C2

217.196.96.101:4132

Attributes
  • auth_value

    da5d4987d25c2de43d34fcc99b29fff3

Targets

    • Target

      27bb642e143ca5d3caa6fb8749422eff329b23f4df555ecff20e10cff671b714

    • Size

      481KB

    • MD5

      eb360636bff9a988424eba037dd44a5e

    • SHA1

      aa386b492d18d0edb704976417ac1342da6dc2c2

    • SHA256

      27bb642e143ca5d3caa6fb8749422eff329b23f4df555ecff20e10cff671b714

    • SHA512

      7ed16cb2f339ba95ed75fe26a14d15d2bbf6126f5b2488a7c8a8139f54b0a5091776a0046b5393acc87bf48aeb0dd0ef6932a936604f66d76ae015eea0fa4e96

    • SSDEEP

      12288:SMryy90PD3BpBiukGmcz0ZvorVcLtKO0:QyED3hkB5orOw5

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks