General

  • Target

    00081e34e876bca12f70718201cced140ead03a90881cda32a50f9f68a256cea

  • Size

    479KB

  • Sample

    230509-t4pfvacg99

  • MD5

    2d229610ed018c93dfcc5b59645526e4

  • SHA1

    945327efd2f65e5dbb047643a046993ec78edc36

  • SHA256

    00081e34e876bca12f70718201cced140ead03a90881cda32a50f9f68a256cea

  • SHA512

    6ae8f321f532d871dec8cfda37ebae8bfbd39dc5c559de7661ced18e5e4da91455f8ccc593e41f790a1bc1d34b28e0fa072ce89ea5ad931a2ed5eb820445e0c8

  • SSDEEP

    12288:nMrny905lUb9c0bInz/hM4f2FX9Z/JkmyXHIH/6zN:wy4lUkdErCIH/6zN

Malware Config

Extracted

Family

redline

Botnet

murka

C2

217.196.96.101:4132

Attributes
  • auth_value

    878a0681ac6ad0e4eb10ef9db07abdd9

Targets

    • Target

      00081e34e876bca12f70718201cced140ead03a90881cda32a50f9f68a256cea

    • Size

      479KB

    • MD5

      2d229610ed018c93dfcc5b59645526e4

    • SHA1

      945327efd2f65e5dbb047643a046993ec78edc36

    • SHA256

      00081e34e876bca12f70718201cced140ead03a90881cda32a50f9f68a256cea

    • SHA512

      6ae8f321f532d871dec8cfda37ebae8bfbd39dc5c559de7661ced18e5e4da91455f8ccc593e41f790a1bc1d34b28e0fa072ce89ea5ad931a2ed5eb820445e0c8

    • SSDEEP

      12288:nMrny905lUb9c0bInz/hM4f2FX9Z/JkmyXHIH/6zN:wy4lUkdErCIH/6zN

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks