General

  • Target

    aea696a1b2ad8d501ab6acc7e293d9081c2eb9a42dafb819e981442fbb25740f

  • Size

    773KB

  • Sample

    230510-ypsxyaab27

  • MD5

    aa29c34b47f42d5d693b74551ab22e00

  • SHA1

    9ea05b3839426bae4a53b7e0e41093593579228b

  • SHA256

    aea696a1b2ad8d501ab6acc7e293d9081c2eb9a42dafb819e981442fbb25740f

  • SHA512

    4cd7e80b4f8a4d9a1b4e8766d44af67bb187981f5a9ea2c9c80413e13fdece6ef8386439c7ed45fc8fbb07316f8710d0cd03582c28a953a7127dc735ee9a0beb

  • SSDEEP

    12288:VMrdy90VBfozh8LPQAcVOXpuYqml7vK/KwXqvbrBs6g7VTrLA4g1:cyoah7ANq+7vK2rKn5rk1

Malware Config

Extracted

Family

redline

Botnet

dubur

C2

217.196.96.102:4132

Attributes
  • auth_value

    32d04179aa1e8d655d2d80c21f99de41

Targets

    • Target

      aea696a1b2ad8d501ab6acc7e293d9081c2eb9a42dafb819e981442fbb25740f

    • Size

      773KB

    • MD5

      aa29c34b47f42d5d693b74551ab22e00

    • SHA1

      9ea05b3839426bae4a53b7e0e41093593579228b

    • SHA256

      aea696a1b2ad8d501ab6acc7e293d9081c2eb9a42dafb819e981442fbb25740f

    • SHA512

      4cd7e80b4f8a4d9a1b4e8766d44af67bb187981f5a9ea2c9c80413e13fdece6ef8386439c7ed45fc8fbb07316f8710d0cd03582c28a953a7127dc735ee9a0beb

    • SSDEEP

      12288:VMrdy90VBfozh8LPQAcVOXpuYqml7vK/KwXqvbrBs6g7VTrLA4g1:cyoah7ANq+7vK2rKn5rk1

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks