General

  • Target

    84348fdf9200947e2c12be60464700918889a8f757f102c6a3bcc594321d55f1

  • Size

    479KB

  • Sample

    230510-d99e7seb68

  • MD5

    ec68ce4203da36f2fc306e8e5d05a23f

  • SHA1

    5eae2ddbf220f3af9cc348691ebba9da1cc4ac93

  • SHA256

    84348fdf9200947e2c12be60464700918889a8f757f102c6a3bcc594321d55f1

  • SHA512

    f59514843aaee6ed72968a186811fe0a0a5e1f870289318645d98ce51f9f1095367dafa78853f3ba456c36b07921a6a278e96fc686bde60f0de66ad21f30633f

  • SSDEEP

    12288:VMrAy90kgglF1xdVWFAPmCXe+Bacbvbiy7IoQoMeGH:pyDDl3UA+pWaY8

Malware Config

Extracted

Family

redline

Botnet

mufos

C2

217.196.96.102:4132

Attributes
  • auth_value

    136f202e6569ad5815c34377858a255c

Targets

    • Target

      84348fdf9200947e2c12be60464700918889a8f757f102c6a3bcc594321d55f1

    • Size

      479KB

    • MD5

      ec68ce4203da36f2fc306e8e5d05a23f

    • SHA1

      5eae2ddbf220f3af9cc348691ebba9da1cc4ac93

    • SHA256

      84348fdf9200947e2c12be60464700918889a8f757f102c6a3bcc594321d55f1

    • SHA512

      f59514843aaee6ed72968a186811fe0a0a5e1f870289318645d98ce51f9f1095367dafa78853f3ba456c36b07921a6a278e96fc686bde60f0de66ad21f30633f

    • SSDEEP

      12288:VMrAy90kgglF1xdVWFAPmCXe+Bacbvbiy7IoQoMeGH:pyDDl3UA+pWaY8

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks