General

  • Target

    7026eacc9c822fe689ae74f267509c2cf2f0410814b16666e57ef3f274e570cf

  • Size

    479KB

  • Sample

    230509-yt39gadh89

  • MD5

    324108c43e12535e66b6d0612e05afec

  • SHA1

    028235bc28177745b00d6a6ba0fb9559bde8d70a

  • SHA256

    7026eacc9c822fe689ae74f267509c2cf2f0410814b16666e57ef3f274e570cf

  • SHA512

    278ccee6f5cd691254aec5405faa4b53712d3b4a4fa95320da054f34c19d5b2ce8a2671c21831979d8965e258d951bb9c12b11c84f20352a8675aa7b85581e0a

  • SSDEEP

    12288:sMrKy90RUQZuThJqe76+WvIQAjghoDMS:eyOZZub6+iHhoDX

Malware Config

Extracted

Family

redline

Botnet

murka

C2

217.196.96.101:4132

Attributes
  • auth_value

    878a0681ac6ad0e4eb10ef9db07abdd9

Targets

    • Target

      7026eacc9c822fe689ae74f267509c2cf2f0410814b16666e57ef3f274e570cf

    • Size

      479KB

    • MD5

      324108c43e12535e66b6d0612e05afec

    • SHA1

      028235bc28177745b00d6a6ba0fb9559bde8d70a

    • SHA256

      7026eacc9c822fe689ae74f267509c2cf2f0410814b16666e57ef3f274e570cf

    • SHA512

      278ccee6f5cd691254aec5405faa4b53712d3b4a4fa95320da054f34c19d5b2ce8a2671c21831979d8965e258d951bb9c12b11c84f20352a8675aa7b85581e0a

    • SSDEEP

      12288:sMrKy90RUQZuThJqe76+WvIQAjghoDMS:eyOZZub6+iHhoDX

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks