General

  • Target

    e81465644d4ef471920e55a11941b50cf37a3f2a6dae2d627dbcf8f5752412ba

  • Size

    479KB

  • Sample

    230510-hcz8gsge5y

  • MD5

    79db531016380942a41c179e222dd1ed

  • SHA1

    8a47d1243b383455ca00b22b8ef489288562e8a6

  • SHA256

    e81465644d4ef471920e55a11941b50cf37a3f2a6dae2d627dbcf8f5752412ba

  • SHA512

    5f6e99e36756090d353cd3b451d5d305fddc04f606d84751a3ee691f2b35b51871bd32176f0e9e1917106f7bad1c9a4772f3604da26019647fa2916bd0dd1852

  • SSDEEP

    12288:NMr1y903+jk0HmQs6vt4e73AVmGtlLhqi:8yFBs6Z7wkGtlLh5

Malware Config

Extracted

Family

redline

Botnet

mufos

C2

217.196.96.102:4132

Attributes
  • auth_value

    136f202e6569ad5815c34377858a255c

Targets

    • Target

      e81465644d4ef471920e55a11941b50cf37a3f2a6dae2d627dbcf8f5752412ba

    • Size

      479KB

    • MD5

      79db531016380942a41c179e222dd1ed

    • SHA1

      8a47d1243b383455ca00b22b8ef489288562e8a6

    • SHA256

      e81465644d4ef471920e55a11941b50cf37a3f2a6dae2d627dbcf8f5752412ba

    • SHA512

      5f6e99e36756090d353cd3b451d5d305fddc04f606d84751a3ee691f2b35b51871bd32176f0e9e1917106f7bad1c9a4772f3604da26019647fa2916bd0dd1852

    • SSDEEP

      12288:NMr1y903+jk0HmQs6vt4e73AVmGtlLhqi:8yFBs6Z7wkGtlLh5

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks