General

  • Target

    ae64e373ee50e72891da193f1e5d8965d995b9c9d5c1927fed16ad1a5532a02e

  • Size

    479KB

  • Sample

    230509-t95d9aeh4t

  • MD5

    41ca07e43ec5f2945b43ec761985e650

  • SHA1

    94d00333518b7aab4b0855482b07013fc2b056fd

  • SHA256

    ae64e373ee50e72891da193f1e5d8965d995b9c9d5c1927fed16ad1a5532a02e

  • SHA512

    5447d150b09a3ff1ca79254c7e8c2a0ed8c354cd1dbe93ccf3f1d5c8244de66ab24198d4d82166352b33d332dbdde5562e2315294a98c52a11637328109fae3f

  • SSDEEP

    12288:cMrEy902gGnajg5l0ihcUUCMUKBwLCphpUS6U:Qy7ajU0iCTCMuL6D

Malware Config

Extracted

Family

redline

Botnet

dease

C2

217.196.96.101:4132

Attributes
  • auth_value

    82e4d5f9abc21848e0345118814a4e6c

Targets

    • Target

      ae64e373ee50e72891da193f1e5d8965d995b9c9d5c1927fed16ad1a5532a02e

    • Size

      479KB

    • MD5

      41ca07e43ec5f2945b43ec761985e650

    • SHA1

      94d00333518b7aab4b0855482b07013fc2b056fd

    • SHA256

      ae64e373ee50e72891da193f1e5d8965d995b9c9d5c1927fed16ad1a5532a02e

    • SHA512

      5447d150b09a3ff1ca79254c7e8c2a0ed8c354cd1dbe93ccf3f1d5c8244de66ab24198d4d82166352b33d332dbdde5562e2315294a98c52a11637328109fae3f

    • SSDEEP

      12288:cMrEy902gGnajg5l0ihcUUCMUKBwLCphpUS6U:Qy7ajU0iCTCMuL6D

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks