General

  • Target

    702ac88cafcb948d090a9556ff43793420c4a02d382af244d72726aaa5632caf

  • Size

    479KB

  • Sample

    230509-t6aqgach36

  • MD5

    5d76b77c959325731035e0eb5996760a

  • SHA1

    c67135580ce52e6e4c409f69c155b53f05ae436b

  • SHA256

    702ac88cafcb948d090a9556ff43793420c4a02d382af244d72726aaa5632caf

  • SHA512

    897119088f01303cedccd77311b1fb3b4be12df3784c049a7df1b950b4f9e48f616ebd4c3972ff88c371cf09171c2ef95d9cb8041785bdc2380d18721df51f1d

  • SSDEEP

    12288:GMrsy908RBdQoiX2zPb1oBP00xI/oewW5P0Yr6EEwLQoew:+yltQX2zP600xI/b35P0Yr6ER1x

Malware Config

Extracted

Family

redline

Botnet

dease

C2

217.196.96.101:4132

Attributes
  • auth_value

    82e4d5f9abc21848e0345118814a4e6c

Targets

    • Target

      702ac88cafcb948d090a9556ff43793420c4a02d382af244d72726aaa5632caf

    • Size

      479KB

    • MD5

      5d76b77c959325731035e0eb5996760a

    • SHA1

      c67135580ce52e6e4c409f69c155b53f05ae436b

    • SHA256

      702ac88cafcb948d090a9556ff43793420c4a02d382af244d72726aaa5632caf

    • SHA512

      897119088f01303cedccd77311b1fb3b4be12df3784c049a7df1b950b4f9e48f616ebd4c3972ff88c371cf09171c2ef95d9cb8041785bdc2380d18721df51f1d

    • SSDEEP

      12288:GMrsy908RBdQoiX2zPb1oBP00xI/oewW5P0Yr6EEwLQoew:+yltQX2zP600xI/b35P0Yr6ER1x

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks