General

  • Target

    7b3a1fc83ac0bcf0da1ba48c3f20ffd7dcd2a7affdf6f31cc28352ca46f613c1

  • Size

    478KB

  • Sample

    230509-t2fqxscg86

  • MD5

    058df9dbd48cdcf5abfdd6a17af3f617

  • SHA1

    b1856f66455fd0b29da121c2275d18e294d377d6

  • SHA256

    7b3a1fc83ac0bcf0da1ba48c3f20ffd7dcd2a7affdf6f31cc28352ca46f613c1

  • SHA512

    4f46b67ffd0117c0ae7b42f52df85a73b3c9c063ba47dd8915092758d7a2ca4b9be68394aba256e8de4b272f69cf10c5443ba1beeeb9c5cd9765365a1471affb

  • SSDEEP

    12288:9Mrqy905Bnf9CNvyyL5c1u31xT1wa7AI8EXE4kqx2:byml9CNv7VXvTlN8EXv92

Malware Config

Extracted

Family

redline

Botnet

dease

C2

217.196.96.101:4132

Attributes
  • auth_value

    82e4d5f9abc21848e0345118814a4e6c

Targets

    • Target

      7b3a1fc83ac0bcf0da1ba48c3f20ffd7dcd2a7affdf6f31cc28352ca46f613c1

    • Size

      478KB

    • MD5

      058df9dbd48cdcf5abfdd6a17af3f617

    • SHA1

      b1856f66455fd0b29da121c2275d18e294d377d6

    • SHA256

      7b3a1fc83ac0bcf0da1ba48c3f20ffd7dcd2a7affdf6f31cc28352ca46f613c1

    • SHA512

      4f46b67ffd0117c0ae7b42f52df85a73b3c9c063ba47dd8915092758d7a2ca4b9be68394aba256e8de4b272f69cf10c5443ba1beeeb9c5cd9765365a1471affb

    • SSDEEP

      12288:9Mrqy905Bnf9CNvyyL5c1u31xT1wa7AI8EXE4kqx2:byml9CNv7VXvTlN8EXv92

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks