General

  • Target

    1ec101b3b51b5202e6b5fdcea6bdfbd45e2f874bc68c37cd647dfc54db692b37

  • Size

    1.1MB

  • Sample

    230513-p8zp6agc26

  • MD5

    87fca3594324cd24be34016fa221b3f9

  • SHA1

    7594bbd77cccf94d178b33c244bd629b31a1d8e0

  • SHA256

    1ec101b3b51b5202e6b5fdcea6bdfbd45e2f874bc68c37cd647dfc54db692b37

  • SHA512

    c0d803969bb28b9a436afb7f7d573d374da8681323fe3d80814aa1a520b6b5281e9035166261e45a5244fa1b5b9762bb32cdf1f3007418fffdd4cd830b970199

  • SSDEEP

    24576:ByJnIAjlERZhGITeOepHBTt4qvZNrcpQ6T:0JnIeYhGIWZ4qspQ6

Malware Config

Extracted

Family

redline

Botnet

dizan

C2

185.161.248.75:4132

Attributes
  • auth_value

    b14d665c7bca8407646527036302d70c

Extracted

Family

redline

Botnet

raven

C2

185.161.248.75:4132

Attributes
  • auth_value

    8b22c01d6173ecee1376933bc63c6028

Targets

    • Target

      1ec101b3b51b5202e6b5fdcea6bdfbd45e2f874bc68c37cd647dfc54db692b37

    • Size

      1.1MB

    • MD5

      87fca3594324cd24be34016fa221b3f9

    • SHA1

      7594bbd77cccf94d178b33c244bd629b31a1d8e0

    • SHA256

      1ec101b3b51b5202e6b5fdcea6bdfbd45e2f874bc68c37cd647dfc54db692b37

    • SHA512

      c0d803969bb28b9a436afb7f7d573d374da8681323fe3d80814aa1a520b6b5281e9035166261e45a5244fa1b5b9762bb32cdf1f3007418fffdd4cd830b970199

    • SSDEEP

      24576:ByJnIAjlERZhGITeOepHBTt4qvZNrcpQ6T:0JnIeYhGIWZ4qspQ6

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks