General

  • Target

    ec14fe05c7282cfa0de30088ab3dd18920f072d2ba9106bddd76653b2cd12a6d

  • Size

    773KB

  • Sample

    230510-yre4vsab36

  • MD5

    7a43b0e80f19c81ddfef35900041fadb

  • SHA1

    8035d44398453495c8fe0891dd524abf90596288

  • SHA256

    ec14fe05c7282cfa0de30088ab3dd18920f072d2ba9106bddd76653b2cd12a6d

  • SHA512

    d8068bc1feba40aba8deeecf4258719d373507a7f2d37aabf6e0a87faddc26b5a98eef2b3978004a5dacc84d2145210c55b5394cf8a995238e5a29f1eee770c3

  • SSDEEP

    12288:QMrfy907IKfFBDyO8ea5OsdssdL+8e+5JC/z4kL85UUVD0hgVT:fyuAlfdLGIYz428yQ0hwT

Malware Config

Extracted

Family

redline

Botnet

dubur

C2

217.196.96.102:4132

Attributes
  • auth_value

    32d04179aa1e8d655d2d80c21f99de41

Targets

    • Target

      ec14fe05c7282cfa0de30088ab3dd18920f072d2ba9106bddd76653b2cd12a6d

    • Size

      773KB

    • MD5

      7a43b0e80f19c81ddfef35900041fadb

    • SHA1

      8035d44398453495c8fe0891dd524abf90596288

    • SHA256

      ec14fe05c7282cfa0de30088ab3dd18920f072d2ba9106bddd76653b2cd12a6d

    • SHA512

      d8068bc1feba40aba8deeecf4258719d373507a7f2d37aabf6e0a87faddc26b5a98eef2b3978004a5dacc84d2145210c55b5394cf8a995238e5a29f1eee770c3

    • SSDEEP

      12288:QMrfy907IKfFBDyO8ea5OsdssdL+8e+5JC/z4kL85UUVD0hgVT:fyuAlfdLGIYz428yQ0hwT

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks