General

  • Target

    98247e840f5321b067fdaaaedb146ddad7391b88eb89e235ca2b2f6792a81bfa

  • Size

    1.5MB

  • Sample

    230504-ncwg7adg3x

  • MD5

    205fa1ae96f04eb4a1c4b6cc8dcc6abb

  • SHA1

    ecd47e50fdbf9c9cfb4b1215b2610c601e123e22

  • SHA256

    98247e840f5321b067fdaaaedb146ddad7391b88eb89e235ca2b2f6792a81bfa

  • SHA512

    75b7842b40653dc36502fa071cfcc926e0335cad9bc3ad68bd88cb8fe0530130bdefe3c8b2087a9270b2fb68cbff4d06707862f62b27286228e49a4ce465ceca

  • SSDEEP

    24576:Qy73Dt76Rj+YRS6uXIx0BUBTkOTmJre+C42hHGtEnwgyCYEy8ooHYxkUNAozWpps:XrDt/PIIKmJy+j2Xp3ZHYX6zG

Malware Config

Extracted

Family

redline

Botnet

boom

C2

217.196.96.56:4138

Attributes
  • auth_value

    1ce6aebe15bac07a7bc88b114bc49335

Targets

    • Target

      98247e840f5321b067fdaaaedb146ddad7391b88eb89e235ca2b2f6792a81bfa

    • Size

      1.5MB

    • MD5

      205fa1ae96f04eb4a1c4b6cc8dcc6abb

    • SHA1

      ecd47e50fdbf9c9cfb4b1215b2610c601e123e22

    • SHA256

      98247e840f5321b067fdaaaedb146ddad7391b88eb89e235ca2b2f6792a81bfa

    • SHA512

      75b7842b40653dc36502fa071cfcc926e0335cad9bc3ad68bd88cb8fe0530130bdefe3c8b2087a9270b2fb68cbff4d06707862f62b27286228e49a4ce465ceca

    • SSDEEP

      24576:Qy73Dt76Rj+YRS6uXIx0BUBTkOTmJre+C42hHGtEnwgyCYEy8ooHYxkUNAozWpps:XrDt/PIIKmJy+j2Xp3ZHYX6zG

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks