General

  • Target

    917b77365f383f2dd070bf34e7f679393722cbc1412d70d7307e318e0f771c95.bin

  • Size

    560KB

  • Sample

    230511-w9vwxsbg8s

  • MD5

    262e35910588e4e194bc98638de56dca

  • SHA1

    6efd56c5e9137a645b5dac7faeef56974852c050

  • SHA256

    917b77365f383f2dd070bf34e7f679393722cbc1412d70d7307e318e0f771c95

  • SHA512

    35aa4603769e6f663e444889c6987672c573838f065add01736ff091afedd9e3acb3a070a53626c2859ff7c348737ac92c7edf178ef82ebee645dd61573e7c8a

  • SSDEEP

    12288:eMrny90EmNbZ+o+kg/rfPt1ut0w5eVHNbHMH0N7:JyaVd+kgPut0w5IeHK7

Malware Config

Extracted

Family

redline

Botnet

gogen

C2

185.161.248.75:4132

Attributes
  • auth_value

    dfb27ce11afd52277523c8e405853d53

Targets

    • Target

      917b77365f383f2dd070bf34e7f679393722cbc1412d70d7307e318e0f771c95.bin

    • Size

      560KB

    • MD5

      262e35910588e4e194bc98638de56dca

    • SHA1

      6efd56c5e9137a645b5dac7faeef56974852c050

    • SHA256

      917b77365f383f2dd070bf34e7f679393722cbc1412d70d7307e318e0f771c95

    • SHA512

      35aa4603769e6f663e444889c6987672c573838f065add01736ff091afedd9e3acb3a070a53626c2859ff7c348737ac92c7edf178ef82ebee645dd61573e7c8a

    • SSDEEP

      12288:eMrny90EmNbZ+o+kg/rfPt1ut0w5eVHNbHMH0N7:JyaVd+kgPut0w5IeHK7

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks