General

  • Target

    87365865ac9820f1b7ac4b96ad10f6e27e949a8919dcbffaead49a965361c106

  • Size

    478KB

  • Sample

    230510-ht941sef66

  • MD5

    512c20f4b5219be6f48a9ddfc8c2f9d2

  • SHA1

    2268e12830c94a0216160d10015badd0df5b3150

  • SHA256

    87365865ac9820f1b7ac4b96ad10f6e27e949a8919dcbffaead49a965361c106

  • SHA512

    aeedbd47077459a983edef8e4f67b0cbbc6ed7092d766154be951daed5ea787bd9c70c0b0eb0c8f418b9b3fbd6470bfa349501d003b36c9bb14f76de5b8dfaa5

  • SSDEEP

    12288:XMrEy90AT8ZSaClWp9EEG8HhbXAHE3Vfp5ip:fyV8ZOmg8ZAHElfp5ip

Malware Config

Extracted

Family

redline

Botnet

divan

C2

217.196.96.102:4132

Attributes
  • auth_value

    b414986bebd7f5a3ec9aee0341b8e769

Targets

    • Target

      87365865ac9820f1b7ac4b96ad10f6e27e949a8919dcbffaead49a965361c106

    • Size

      478KB

    • MD5

      512c20f4b5219be6f48a9ddfc8c2f9d2

    • SHA1

      2268e12830c94a0216160d10015badd0df5b3150

    • SHA256

      87365865ac9820f1b7ac4b96ad10f6e27e949a8919dcbffaead49a965361c106

    • SHA512

      aeedbd47077459a983edef8e4f67b0cbbc6ed7092d766154be951daed5ea787bd9c70c0b0eb0c8f418b9b3fbd6470bfa349501d003b36c9bb14f76de5b8dfaa5

    • SSDEEP

      12288:XMrEy90AT8ZSaClWp9EEG8HhbXAHE3Vfp5ip:fyV8ZOmg8ZAHElfp5ip

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks