General

  • Target

    5a83f874ea5fb32dc76ac37394dacb6f204a111035529fdd6a6187da76f33c00

  • Size

    884KB

  • Sample

    230511-sg43caga4x

  • MD5

    b8316a557cf7bef42c42923449e423b0

  • SHA1

    0c73d7745f9abc98964055d932e01782db9da11b

  • SHA256

    5a83f874ea5fb32dc76ac37394dacb6f204a111035529fdd6a6187da76f33c00

  • SHA512

    b145401fefda352adfd96952149596eae13e7981c77c7cd3de55f243663ed0f737c23e55cd3960361b57bef57897c4123201c480969c335bb4ab9371ad105aaf

  • SSDEEP

    12288:/MrEy90iw9dJnQSYkQz/rGG/1Am2prA9bigPsnooy/b5VJsrE2u9EbaC:3yA9bQHkQ+MAnE9mgEoN/Lv2haC

Malware Config

Extracted

Family

redline

Botnet

mixa

C2

185.161.248.75:4132

Attributes
  • auth_value

    9d14534b25ac495ab25b59800acf3bb2

Extracted

Family

redline

Botnet

gogen

C2

185.161.248.75:4132

Attributes
  • auth_value

    dfb27ce11afd52277523c8e405853d53

Targets

    • Target

      5a83f874ea5fb32dc76ac37394dacb6f204a111035529fdd6a6187da76f33c00

    • Size

      884KB

    • MD5

      b8316a557cf7bef42c42923449e423b0

    • SHA1

      0c73d7745f9abc98964055d932e01782db9da11b

    • SHA256

      5a83f874ea5fb32dc76ac37394dacb6f204a111035529fdd6a6187da76f33c00

    • SHA512

      b145401fefda352adfd96952149596eae13e7981c77c7cd3de55f243663ed0f737c23e55cd3960361b57bef57897c4123201c480969c335bb4ab9371ad105aaf

    • SSDEEP

      12288:/MrEy90iw9dJnQSYkQz/rGG/1Am2prA9bigPsnooy/b5VJsrE2u9EbaC:3yA9bQHkQ+MAnE9mgEoN/Lv2haC

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks