General

  • Target

    dd65edb0c4aa662a9d957573533210f65b8a917a14a315af2d0b386d5ecd92a9

  • Size

    769KB

  • Sample

    230511-gtt75aca67

  • MD5

    810402117bc736d6d1c28e2eb222a00d

  • SHA1

    c18e92313c5c9b765015c3a0a06b2c1b3a74ce91

  • SHA256

    dd65edb0c4aa662a9d957573533210f65b8a917a14a315af2d0b386d5ecd92a9

  • SHA512

    7bd76cc899905808b460e6d46fa3f5fd6838f8bce8c756529bf7ef8f15aa4c9ae30ee2ded161eca326f23d56d753a490d033820bb82cc767a7a9b662c052fb1b

  • SSDEEP

    24576:JyqyB0O9Wj4SjhYHcz6a3WcSYIj9Z3r4fAkS7h2:8L9qvq8OiWcgAS7

Malware Config

Extracted

Family

redline

Botnet

debro

C2

185.161.248.75:4132

Attributes
  • auth_value

    18c2c191aebfde5d1787ec8d805a01a8

Targets

    • Target

      dd65edb0c4aa662a9d957573533210f65b8a917a14a315af2d0b386d5ecd92a9

    • Size

      769KB

    • MD5

      810402117bc736d6d1c28e2eb222a00d

    • SHA1

      c18e92313c5c9b765015c3a0a06b2c1b3a74ce91

    • SHA256

      dd65edb0c4aa662a9d957573533210f65b8a917a14a315af2d0b386d5ecd92a9

    • SHA512

      7bd76cc899905808b460e6d46fa3f5fd6838f8bce8c756529bf7ef8f15aa4c9ae30ee2ded161eca326f23d56d753a490d033820bb82cc767a7a9b662c052fb1b

    • SSDEEP

      24576:JyqyB0O9Wj4SjhYHcz6a3WcSYIj9Z3r4fAkS7h2:8L9qvq8OiWcgAS7

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks