General

  • Target

    d5dbee37c1dbc4fb4588f26aa035d0bdf55f9f40811ade4eba0e4b20eb69afe7

  • Size

    480KB

  • Sample

    230509-ybxzqsfg41

  • MD5

    6deb6618ef6f21e6dad086121fe236dd

  • SHA1

    b77bfe9ecc1f26277f5989566a789f3c692aa489

  • SHA256

    d5dbee37c1dbc4fb4588f26aa035d0bdf55f9f40811ade4eba0e4b20eb69afe7

  • SHA512

    1c0d2cd85848d8925a5d71495acaa51dba68408e014ebbd9fc116569e5fad0057f0727444dca5607096f147d695eeb9358da7480e7137adfd48308e9bf18315f

  • SSDEEP

    12288:iMrky90mcVSLfV0AD9e8aC4hP6dmfWgOe1xyXp:Kyl9tfD9oW0fBOmyZ

Malware Config

Extracted

Family

redline

Botnet

dease

C2

217.196.96.101:4132

Attributes
  • auth_value

    82e4d5f9abc21848e0345118814a4e6c

Targets

    • Target

      d5dbee37c1dbc4fb4588f26aa035d0bdf55f9f40811ade4eba0e4b20eb69afe7

    • Size

      480KB

    • MD5

      6deb6618ef6f21e6dad086121fe236dd

    • SHA1

      b77bfe9ecc1f26277f5989566a789f3c692aa489

    • SHA256

      d5dbee37c1dbc4fb4588f26aa035d0bdf55f9f40811ade4eba0e4b20eb69afe7

    • SHA512

      1c0d2cd85848d8925a5d71495acaa51dba68408e014ebbd9fc116569e5fad0057f0727444dca5607096f147d695eeb9358da7480e7137adfd48308e9bf18315f

    • SSDEEP

      12288:iMrky90mcVSLfV0AD9e8aC4hP6dmfWgOe1xyXp:Kyl9tfD9oW0fBOmyZ

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks