General

  • Target

    a677245ed5b207d615e6201afa2b3a9ad2932f5dcd5ce90bdfee0a1972f8c131

  • Size

    488KB

  • Sample

    230510-twf5haag3t

  • MD5

    58b5836fa7534850c4f5a9fc059e5d51

  • SHA1

    c5a45b096f5c3c6d47d804a7767596a1660c8029

  • SHA256

    a677245ed5b207d615e6201afa2b3a9ad2932f5dcd5ce90bdfee0a1972f8c131

  • SHA512

    d7e37608a40cea12bd76996ccc5ab90c7ddd890406d391b437defb8c7da532d582f17990a9a28b820fb5fd3faa0b638f7097ed650c51b449411c86334df16e38

  • SSDEEP

    12288:6Mrny9050jtpEp1ajDbG1UoKzIuMI2Bql97g:dyS07e1M/50ub2Qg

Malware Config

Extracted

Family

redline

Botnet

misik

C2

217.196.96.102:4132

Attributes
  • auth_value

    9133827666bc8f4b05339316460b08aa

Targets

    • Target

      a677245ed5b207d615e6201afa2b3a9ad2932f5dcd5ce90bdfee0a1972f8c131

    • Size

      488KB

    • MD5

      58b5836fa7534850c4f5a9fc059e5d51

    • SHA1

      c5a45b096f5c3c6d47d804a7767596a1660c8029

    • SHA256

      a677245ed5b207d615e6201afa2b3a9ad2932f5dcd5ce90bdfee0a1972f8c131

    • SHA512

      d7e37608a40cea12bd76996ccc5ab90c7ddd890406d391b437defb8c7da532d582f17990a9a28b820fb5fd3faa0b638f7097ed650c51b449411c86334df16e38

    • SSDEEP

      12288:6Mrny9050jtpEp1ajDbG1UoKzIuMI2Bql97g:dyS07e1M/50ub2Qg

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks