General

  • Target

    310a955bd465a7f648f92df089b37320a2a1bf57c63736ef7d9c83e2052c9e3f

  • Size

    481KB

  • Sample

    230509-zkwnpsga3x

  • MD5

    154f49d0f675ea0fa642c09fedf49735

  • SHA1

    ff4570212f9d45d4cbb6ee4e3d00d63c41b3555e

  • SHA256

    310a955bd465a7f648f92df089b37320a2a1bf57c63736ef7d9c83e2052c9e3f

  • SHA512

    f48378a1f1215a5f908863344adec461033068271fb04d9e959cf986956586f24eed44d852731422e32c7a6088435b11bcb55436cac672b19d160944e7e2d49a

  • SSDEEP

    12288:8Mrgy903jWwPkvJ6R3t7GVLmd860V/FNHBiPXZso:8y12MU05hwXZB

Malware Config

Extracted

Family

redline

Botnet

dease

C2

217.196.96.101:4132

Attributes
  • auth_value

    82e4d5f9abc21848e0345118814a4e6c

Targets

    • Target

      310a955bd465a7f648f92df089b37320a2a1bf57c63736ef7d9c83e2052c9e3f

    • Size

      481KB

    • MD5

      154f49d0f675ea0fa642c09fedf49735

    • SHA1

      ff4570212f9d45d4cbb6ee4e3d00d63c41b3555e

    • SHA256

      310a955bd465a7f648f92df089b37320a2a1bf57c63736ef7d9c83e2052c9e3f

    • SHA512

      f48378a1f1215a5f908863344adec461033068271fb04d9e959cf986956586f24eed44d852731422e32c7a6088435b11bcb55436cac672b19d160944e7e2d49a

    • SSDEEP

      12288:8Mrgy903jWwPkvJ6R3t7GVLmd860V/FNHBiPXZso:8y12MU05hwXZB

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks