General

  • Target

    0094e9329691b02305afeb49b73ed31f.exe

  • Size

    2.4MB

  • Sample

    210505-7v9z1h7den

  • MD5

    0094e9329691b02305afeb49b73ed31f

  • SHA1

    e38cd5b500ee6db18594fcffb9e7860911340daf

  • SHA256

    50d2b07713cb4e000c40255a46ad201c50d8f8c804f8c227ec1fe74451562039

  • SHA512

    2a38bdf3c51ac9b071f49d35e8a2d0d3f95452d22b5518475f6dfc3f6f772c924545c1893269a292d79288ef75946b6bdbc84170acac2016098792424f9c91c6

Malware Config

Extracted

Family

redline

C2

5.188.118.35:19651

Targets

    • Target

      0094e9329691b02305afeb49b73ed31f.exe

    • Size

      2.4MB

    • MD5

      0094e9329691b02305afeb49b73ed31f

    • SHA1

      e38cd5b500ee6db18594fcffb9e7860911340daf

    • SHA256

      50d2b07713cb4e000c40255a46ad201c50d8f8c804f8c227ec1fe74451562039

    • SHA512

      2a38bdf3c51ac9b071f49d35e8a2d0d3f95452d22b5518475f6dfc3f6f772c924545c1893269a292d79288ef75946b6bdbc84170acac2016098792424f9c91c6

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Turns off Windows Defender SpyNet reporting

    • Windows security bypass

    • Nirsoft

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Defense Evasion

Modify Registry

4
T1112

Disabling Security Tools

4
T1089

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks