General

  • Target

    f93d75051e97fcabe654cfc23d7e0337db3b2e5fd8e5cb783b451274b53b1098

  • Size

    876KB

  • Sample

    230511-zpp2qaaf29

  • MD5

    b4581dd776243a5df873273dc5011ba4

  • SHA1

    ec7c62cd5cc0ab05daf8eb12170143c6b03df4d3

  • SHA256

    f93d75051e97fcabe654cfc23d7e0337db3b2e5fd8e5cb783b451274b53b1098

  • SHA512

    aa32b6d6bf813c2895913365c1a6916c1aecdf96a5b93b1f62c348fad223f220703766182fab8151bb4b98b12cfef9f088b8fef194196b0773adb39c2dcb0c92

  • SSDEEP

    24576:Jy/bDKg1wMgs65uI88Ypw6/eV7/f+YZ6wpjhowCq:8/6nsmPMByjcWod

Malware Config

Extracted

Family

redline

Botnet

druid

C2

185.161.248.75:4132

Attributes
  • auth_value

    fddcb4126f1d0ea4ac975511b3530e72

Extracted

Family

redline

Botnet

roza

C2

185.161.248.75:4132

Attributes
  • auth_value

    3e701c8c522386806a8f1f40a90873a7

Targets

    • Target

      f93d75051e97fcabe654cfc23d7e0337db3b2e5fd8e5cb783b451274b53b1098

    • Size

      876KB

    • MD5

      b4581dd776243a5df873273dc5011ba4

    • SHA1

      ec7c62cd5cc0ab05daf8eb12170143c6b03df4d3

    • SHA256

      f93d75051e97fcabe654cfc23d7e0337db3b2e5fd8e5cb783b451274b53b1098

    • SHA512

      aa32b6d6bf813c2895913365c1a6916c1aecdf96a5b93b1f62c348fad223f220703766182fab8151bb4b98b12cfef9f088b8fef194196b0773adb39c2dcb0c92

    • SSDEEP

      24576:Jy/bDKg1wMgs65uI88Ypw6/eV7/f+YZ6wpjhowCq:8/6nsmPMByjcWod

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks