General

  • Target

    e88444241a629edb7203fae11d29fb1f42e010106c808592a50f86cc8e3b038e

  • Size

    479KB

  • Sample

    230510-jnradsgg5z

  • MD5

    46e585869aa9c82f01a6dbea123beee0

  • SHA1

    deff1d87fad2228926806e32f497b76bdfa7c804

  • SHA256

    e88444241a629edb7203fae11d29fb1f42e010106c808592a50f86cc8e3b038e

  • SHA512

    b9d1a2bcc35c3dddc4b1a872087a98b5b851617331ff5d53dad0c65bb8f173012f3ad93f446cc7b1a0941fed1dff88ace11233a21c5da7e2ef4acef5726da57b

  • SSDEEP

    12288:oMrXy90fMSyAqdJjQIecLlgRUlcoCoDuFCusg:fy82AMJMchgW2oDqCusg

Malware Config

Extracted

Family

redline

Botnet

divan

C2

217.196.96.102:4132

Attributes
  • auth_value

    b414986bebd7f5a3ec9aee0341b8e769

Targets

    • Target

      e88444241a629edb7203fae11d29fb1f42e010106c808592a50f86cc8e3b038e

    • Size

      479KB

    • MD5

      46e585869aa9c82f01a6dbea123beee0

    • SHA1

      deff1d87fad2228926806e32f497b76bdfa7c804

    • SHA256

      e88444241a629edb7203fae11d29fb1f42e010106c808592a50f86cc8e3b038e

    • SHA512

      b9d1a2bcc35c3dddc4b1a872087a98b5b851617331ff5d53dad0c65bb8f173012f3ad93f446cc7b1a0941fed1dff88ace11233a21c5da7e2ef4acef5726da57b

    • SSDEEP

      12288:oMrXy90fMSyAqdJjQIecLlgRUlcoCoDuFCusg:fy82AMJMchgW2oDqCusg

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks