General

  • Target

    6a99bfc6162c0e8c122c7fe5f5a9837ab45f21365ac005f23f2f6887266f9cb9

  • Size

    1.1MB

  • Sample

    230513-ax3v4shb4s

  • MD5

    4ec96bc66f215871a184b48155822a56

  • SHA1

    eb9a43e2b54ec245e91d5e2d10de9f35d5a5159e

  • SHA256

    6a99bfc6162c0e8c122c7fe5f5a9837ab45f21365ac005f23f2f6887266f9cb9

  • SHA512

    a758c6533e281a3f1fbd1a01a102d912a2d3853449bf80dd0a6b7edd60eb9fc6410707527fde9c724095e40cc5cee2c1bdc8f65836ad00fb7ceb32c62c34b4e0

  • SSDEEP

    24576:UyH+O4P9ObFN7w4UFk608MJ6OrsH3g88PeJOP5OUHsdcGz:jHH4VO5N7dUFk6IUH8GGsdP

Malware Config

Extracted

Family

redline

Botnet

masta

C2

185.161.248.75:4132

Attributes
  • auth_value

    57f23b6b74d0f680c5a0c8ac9f52bd75

Extracted

Family

redline

Botnet

joana

C2

185.161.248.75:4132

Attributes
  • auth_value

    85090ed112d639bb782481da2912487a

Targets

    • Target

      6a99bfc6162c0e8c122c7fe5f5a9837ab45f21365ac005f23f2f6887266f9cb9

    • Size

      1.1MB

    • MD5

      4ec96bc66f215871a184b48155822a56

    • SHA1

      eb9a43e2b54ec245e91d5e2d10de9f35d5a5159e

    • SHA256

      6a99bfc6162c0e8c122c7fe5f5a9837ab45f21365ac005f23f2f6887266f9cb9

    • SHA512

      a758c6533e281a3f1fbd1a01a102d912a2d3853449bf80dd0a6b7edd60eb9fc6410707527fde9c724095e40cc5cee2c1bdc8f65836ad00fb7ceb32c62c34b4e0

    • SSDEEP

      24576:UyH+O4P9ObFN7w4UFk608MJ6OrsH3g88PeJOP5OUHsdcGz:jHH4VO5N7dUFk6IUH8GGsdP

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks