General

  • Target

    9aec40c74e09632c1063738aae0749d71112bedc710a3efd6d4d0d870a2f43cb.bin

  • Size

    884KB

  • Sample

    230511-w91geabg9y

  • MD5

    7891149e4a9f34052c3fbbc19912bef5

  • SHA1

    0de240ea1912e99803a46589e6ff2e8adb18d91c

  • SHA256

    9aec40c74e09632c1063738aae0749d71112bedc710a3efd6d4d0d870a2f43cb

  • SHA512

    c42b600dd76a9c1be2439447affe5b25b7791783cccf7253e6744131d7d04a7d1ef78bb17dc7a911370d91af3907be469c4b78377b8d0cb3d008d13ecb31bdaa

  • SSDEEP

    12288:3MrZy90Kn0qeb3tJhLC0mW3c00YjiVl4SM9lFSMiDkPFCdKGhwN1nk:OyN0H3BCl38SMvPIHhwNBk

Malware Config

Extracted

Family

redline

Botnet

debro

C2

185.161.248.75:4132

Attributes
  • auth_value

    18c2c191aebfde5d1787ec8d805a01a8

Extracted

Family

redline

Botnet

gogen

C2

185.161.248.75:4132

Attributes
  • auth_value

    dfb27ce11afd52277523c8e405853d53

Targets

    • Target

      9aec40c74e09632c1063738aae0749d71112bedc710a3efd6d4d0d870a2f43cb.bin

    • Size

      884KB

    • MD5

      7891149e4a9f34052c3fbbc19912bef5

    • SHA1

      0de240ea1912e99803a46589e6ff2e8adb18d91c

    • SHA256

      9aec40c74e09632c1063738aae0749d71112bedc710a3efd6d4d0d870a2f43cb

    • SHA512

      c42b600dd76a9c1be2439447affe5b25b7791783cccf7253e6744131d7d04a7d1ef78bb17dc7a911370d91af3907be469c4b78377b8d0cb3d008d13ecb31bdaa

    • SSDEEP

      12288:3MrZy90Kn0qeb3tJhLC0mW3c00YjiVl4SM9lFSMiDkPFCdKGhwN1nk:OyN0H3BCl38SMvPIHhwNBk

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks