General

  • Target

    dcf16f98c93ba7155037cc07d0f280ff65ca1ea103d142d948da70451c2c3ca9

  • Size

    479KB

  • Sample

    230509-sggxtabh77

  • MD5

    6b897c6e643053b711315b03379363a0

  • SHA1

    4d10f703bd059229587ca6623967065dfeba6b2b

  • SHA256

    dcf16f98c93ba7155037cc07d0f280ff65ca1ea103d142d948da70451c2c3ca9

  • SHA512

    f239acb40bf05e5caaa9b08f46f9074bca8a9f50e8fba90892e0c32d15db19c6c6543c6a1a9f63d66fa1250330ec5dc0b3c8066551519dd5e275b4965b0d7557

  • SSDEEP

    12288:vMrOy908alJlkNBB6Oe2NBwpnM05lMp5:NyyABSeWpnM05lMp5

Malware Config

Extracted

Family

redline

Botnet

douma

C2

217.196.96.101:4132

Attributes
  • auth_value

    e7c0659b5f9d26f2f97df8d25fefbb44

Targets

    • Target

      dcf16f98c93ba7155037cc07d0f280ff65ca1ea103d142d948da70451c2c3ca9

    • Size

      479KB

    • MD5

      6b897c6e643053b711315b03379363a0

    • SHA1

      4d10f703bd059229587ca6623967065dfeba6b2b

    • SHA256

      dcf16f98c93ba7155037cc07d0f280ff65ca1ea103d142d948da70451c2c3ca9

    • SHA512

      f239acb40bf05e5caaa9b08f46f9074bca8a9f50e8fba90892e0c32d15db19c6c6543c6a1a9f63d66fa1250330ec5dc0b3c8066551519dd5e275b4965b0d7557

    • SSDEEP

      12288:vMrOy908alJlkNBB6Oe2NBwpnM05lMp5:NyyABSeWpnM05lMp5

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks