General

  • Target

    34160bb03ac43a32f17ce446ec94a69afde4a8b77b5e5ddd0ae89c5c0aa55502

  • Size

    1.1MB

  • Sample

    230512-negrtacg93

  • MD5

    654695ad618f0e4759ae3374638bcedd

  • SHA1

    4c6b7fe9d13305a60db64a8408fa3f08fda72710

  • SHA256

    34160bb03ac43a32f17ce446ec94a69afde4a8b77b5e5ddd0ae89c5c0aa55502

  • SHA512

    f67f98cd8e1eac8ad9a70c7ddb658eecc40882900fd4796a4e1203dfbd408a95f1db3c8699fc535e9683fd2e67c5189d82d1bb76f33880f430f8fe12d15fba6d

  • SSDEEP

    24576:Tyvsp1gidHEVjuFVqtMA0Eqog2k8T+/SXgcS:mS1BEVOVqBnqoRksQ

Malware Config

Extracted

Family

redline

Botnet

mizer

C2

185.161.248.75:4132

Attributes
  • auth_value

    353ae46e71ea5671b9ed097b65a8a2be

Extracted

Family

redline

Botnet

jamba

C2

185.161.248.75:4132

Attributes
  • auth_value

    b01bf275593de07ba204560db44b861a

Targets

    • Target

      34160bb03ac43a32f17ce446ec94a69afde4a8b77b5e5ddd0ae89c5c0aa55502

    • Size

      1.1MB

    • MD5

      654695ad618f0e4759ae3374638bcedd

    • SHA1

      4c6b7fe9d13305a60db64a8408fa3f08fda72710

    • SHA256

      34160bb03ac43a32f17ce446ec94a69afde4a8b77b5e5ddd0ae89c5c0aa55502

    • SHA512

      f67f98cd8e1eac8ad9a70c7ddb658eecc40882900fd4796a4e1203dfbd408a95f1db3c8699fc535e9683fd2e67c5189d82d1bb76f33880f430f8fe12d15fba6d

    • SSDEEP

      24576:Tyvsp1gidHEVjuFVqtMA0Eqog2k8T+/SXgcS:mS1BEVOVqBnqoRksQ

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks