General

  • Target

    adcf10d6f25a16acdde6c6936c580355d2f4176a8c36ad077d036e2c462955da

  • Size

    1.0MB

  • Sample

    230518-ed8pgagf7y

  • MD5

    b726c78d04687218945c68407d89cadd

  • SHA1

    edd43e6ad3c923590d7302715b24c80f282cbd1a

  • SHA256

    adcf10d6f25a16acdde6c6936c580355d2f4176a8c36ad077d036e2c462955da

  • SHA512

    9e570bef82a99a942981da40deea98b3851013ec48c866a3bceece103e91dae74727265d7e652bb6910fbe95dcee7032cbc4767f4ed108caa9874b1116beae25

  • SSDEEP

    24576:EuyeAeDonj5lOViEgc0IR/1G+NCJgv9IcgD+9jbIaR:E9peDoj5IVGxmvmjD

Malware Config

Extracted

Family

redline

Botnet

dream

C2

77.91.68.253:4138

Attributes
  • auth_value

    7b4f26a4ca794e30cee1032d5cb62f5c

Targets

    • Target

      adcf10d6f25a16acdde6c6936c580355d2f4176a8c36ad077d036e2c462955da

    • Size

      1.0MB

    • MD5

      b726c78d04687218945c68407d89cadd

    • SHA1

      edd43e6ad3c923590d7302715b24c80f282cbd1a

    • SHA256

      adcf10d6f25a16acdde6c6936c580355d2f4176a8c36ad077d036e2c462955da

    • SHA512

      9e570bef82a99a942981da40deea98b3851013ec48c866a3bceece103e91dae74727265d7e652bb6910fbe95dcee7032cbc4767f4ed108caa9874b1116beae25

    • SSDEEP

      24576:EuyeAeDonj5lOViEgc0IR/1G+NCJgv9IcgD+9jbIaR:E9peDoj5IVGxmvmjD

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks