General

  • Target

    589904ce0a87a7f55e941714c8c16eb8ae59ca9faae7f1d4f8e3b6224323fdeb

  • Size

    478KB

  • Sample

    230510-m8j9csff37

  • MD5

    8de17eeac52f19f11d8aef8eeb9b6a6d

  • SHA1

    62e259294d21ae31913edc6c20739075b47accac

  • SHA256

    589904ce0a87a7f55e941714c8c16eb8ae59ca9faae7f1d4f8e3b6224323fdeb

  • SHA512

    463e5cade45bf712edbe58eb231791e1a5567468eb29033496281cfbcf4ad5ebaec7a8d42ce1db88a76e8ae130b04efd5ad80b0a8785135b40512cd716c05a1b

  • SSDEEP

    12288:rMr1y90NlwgdpfeoVKwFEbOw9wGwlwBhmp0kOEmmxlC:WyAHKrwGs8gmmxM

Malware Config

Extracted

Family

redline

Botnet

dippo

C2

217.196.96.102:4132

Attributes
  • auth_value

    79490ff628fd6af3b29170c3c163874b

Targets

    • Target

      589904ce0a87a7f55e941714c8c16eb8ae59ca9faae7f1d4f8e3b6224323fdeb

    • Size

      478KB

    • MD5

      8de17eeac52f19f11d8aef8eeb9b6a6d

    • SHA1

      62e259294d21ae31913edc6c20739075b47accac

    • SHA256

      589904ce0a87a7f55e941714c8c16eb8ae59ca9faae7f1d4f8e3b6224323fdeb

    • SHA512

      463e5cade45bf712edbe58eb231791e1a5567468eb29033496281cfbcf4ad5ebaec7a8d42ce1db88a76e8ae130b04efd5ad80b0a8785135b40512cd716c05a1b

    • SSDEEP

      12288:rMr1y90NlwgdpfeoVKwFEbOw9wGwlwBhmp0kOEmmxlC:WyAHKrwGs8gmmxM

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks