General

  • Target

    03b029ef1b292a4c3f198816678fc4db574997ab345d69c992240fc3980d957e

  • Size

    874KB

  • Sample

    230511-2999haah76

  • MD5

    e2e95156b0d9598edaf60dabc2820df7

  • SHA1

    80cdebb97d32ba93192765e87fdec02ebb81fcbf

  • SHA256

    03b029ef1b292a4c3f198816678fc4db574997ab345d69c992240fc3980d957e

  • SHA512

    13652957699d93670f6db37551a76a6a191222707f1bceaf9cecaa864715d5b748b8f58d019820ddd542ff40cc545a3f825dd2acc63f66b3330a0e7473e55e34

  • SSDEEP

    24576:Ey95v/GSO5aMqnk9Y38OrJNNKKoGo6iUh:T95GrIJNsKoGo6i

Malware Config

Extracted

Family

redline

Botnet

dimas

C2

185.161.248.75:4132

Attributes
  • auth_value

    a5db9b1c53c704e612bccc93ccdb5539

Extracted

Family

redline

Botnet

roza

C2

185.161.248.75:4132

Attributes
  • auth_value

    3e701c8c522386806a8f1f40a90873a7

Targets

    • Target

      03b029ef1b292a4c3f198816678fc4db574997ab345d69c992240fc3980d957e

    • Size

      874KB

    • MD5

      e2e95156b0d9598edaf60dabc2820df7

    • SHA1

      80cdebb97d32ba93192765e87fdec02ebb81fcbf

    • SHA256

      03b029ef1b292a4c3f198816678fc4db574997ab345d69c992240fc3980d957e

    • SHA512

      13652957699d93670f6db37551a76a6a191222707f1bceaf9cecaa864715d5b748b8f58d019820ddd542ff40cc545a3f825dd2acc63f66b3330a0e7473e55e34

    • SSDEEP

      24576:Ey95v/GSO5aMqnk9Y38OrJNNKKoGo6iUh:T95GrIJNsKoGo6i

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks