General

  • Target

    bfa96e9d5ff897ac71ce0b30a690eb77c8d24dd19c8b4698a29c73139834c2df

  • Size

    1.5MB

  • Sample

    230504-nqlvxaca72

  • MD5

    47da082aa4e3f32a8d0ca2ee85d66a6a

  • SHA1

    0f9cc9da678aca14d4d2f2d939971d926c40b86d

  • SHA256

    bfa96e9d5ff897ac71ce0b30a690eb77c8d24dd19c8b4698a29c73139834c2df

  • SHA512

    0b459f1311eb2385a44a4a592ee924bcdd315616a949fda13362aa66baa5c8210c36fde4376ce694b22cbadcd01ba20a866d291f1394963f71e180449e7e296c

  • SSDEEP

    49152:6WKLm1kwvAIiI277W20LdYt2ZmTrqGVH4AFY1T1+:fiFIk30xQEGlXFI

Malware Config

Extracted

Family

redline

Botnet

boom

C2

217.196.96.56:4138

Attributes
  • auth_value

    1ce6aebe15bac07a7bc88b114bc49335

Targets

    • Target

      bfa96e9d5ff897ac71ce0b30a690eb77c8d24dd19c8b4698a29c73139834c2df

    • Size

      1.5MB

    • MD5

      47da082aa4e3f32a8d0ca2ee85d66a6a

    • SHA1

      0f9cc9da678aca14d4d2f2d939971d926c40b86d

    • SHA256

      bfa96e9d5ff897ac71ce0b30a690eb77c8d24dd19c8b4698a29c73139834c2df

    • SHA512

      0b459f1311eb2385a44a4a592ee924bcdd315616a949fda13362aa66baa5c8210c36fde4376ce694b22cbadcd01ba20a866d291f1394963f71e180449e7e296c

    • SSDEEP

      49152:6WKLm1kwvAIiI277W20LdYt2ZmTrqGVH4AFY1T1+:fiFIk30xQEGlXFI

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks