General

  • Target

    64ac5f58e3a0fe81c5ebf401bcccc253c4949d446889f1980d71ef345352f5a9

  • Size

    1.1MB

  • Sample

    230513-afhhvaha91

  • MD5

    bef5bb6acbb714198c5fbcf6d778b03a

  • SHA1

    327f013ec1386f2f8fa655cbe19e268b518fd73c

  • SHA256

    64ac5f58e3a0fe81c5ebf401bcccc253c4949d446889f1980d71ef345352f5a9

  • SHA512

    3868d9431c875f4424ac9069de4bb0d78d782247ebc4b151da7baebc88f76fdf46904fc86143419241f7ff66c83ccccd5276976f9cc4d1e763c04b3db9442bb7

  • SSDEEP

    24576:XyUVfSHPa11itdDrFkkzs+PWEvrOUKpMYVFKSauaGno5:iUVqva1IdDrFkkz7PWETOfpMjGa6

Malware Config

Extracted

Family

redline

Botnet

masta

C2

185.161.248.75:4132

Attributes
  • auth_value

    57f23b6b74d0f680c5a0c8ac9f52bd75

Extracted

Family

redline

Botnet

joana

C2

185.161.248.75:4132

Attributes
  • auth_value

    85090ed112d639bb782481da2912487a

Targets

    • Target

      64ac5f58e3a0fe81c5ebf401bcccc253c4949d446889f1980d71ef345352f5a9

    • Size

      1.1MB

    • MD5

      bef5bb6acbb714198c5fbcf6d778b03a

    • SHA1

      327f013ec1386f2f8fa655cbe19e268b518fd73c

    • SHA256

      64ac5f58e3a0fe81c5ebf401bcccc253c4949d446889f1980d71ef345352f5a9

    • SHA512

      3868d9431c875f4424ac9069de4bb0d78d782247ebc4b151da7baebc88f76fdf46904fc86143419241f7ff66c83ccccd5276976f9cc4d1e763c04b3db9442bb7

    • SSDEEP

      24576:XyUVfSHPa11itdDrFkkzs+PWEvrOUKpMYVFKSauaGno5:iUVqva1IdDrFkkz7PWETOfpMjGa6

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks