General

  • Target

    cc3756f88b1e201cb864b889775b88137d8b83283d2ad74f70bab4ffc5a7410b

  • Size

    479KB

  • Sample

    230510-bsqwesff2v

  • MD5

    cae0ac30385573b4a25373ff4239830d

  • SHA1

    6eeb9f0c6928b4ac51a02bd8f681c032a5c98cf9

  • SHA256

    cc3756f88b1e201cb864b889775b88137d8b83283d2ad74f70bab4ffc5a7410b

  • SHA512

    ff52f3d03c20e4f47f70dc1469471724db8a4e975fc70ec60655585178ec9457122610ed8ee9bb696bde617bd4f0a4effc77139d5b3149a46c05a7f47728e377

  • SSDEEP

    12288:/MrAy90CJkBuvqECKvfIJZDMFC1MalGXdLIS23bZsMED:Xyl/vL3O+FC1rls1+CD

Malware Config

Extracted

Family

redline

Botnet

mufos

C2

217.196.96.102:4132

Attributes
  • auth_value

    136f202e6569ad5815c34377858a255c

Targets

    • Target

      cc3756f88b1e201cb864b889775b88137d8b83283d2ad74f70bab4ffc5a7410b

    • Size

      479KB

    • MD5

      cae0ac30385573b4a25373ff4239830d

    • SHA1

      6eeb9f0c6928b4ac51a02bd8f681c032a5c98cf9

    • SHA256

      cc3756f88b1e201cb864b889775b88137d8b83283d2ad74f70bab4ffc5a7410b

    • SHA512

      ff52f3d03c20e4f47f70dc1469471724db8a4e975fc70ec60655585178ec9457122610ed8ee9bb696bde617bd4f0a4effc77139d5b3149a46c05a7f47728e377

    • SSDEEP

      12288:/MrAy90CJkBuvqECKvfIJZDMFC1MalGXdLIS23bZsMED:Xyl/vL3O+FC1rls1+CD

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks