General

  • Target

    ba401da0d62d69b098447b5a07772436f599269929429a61f9a85f6857a66ab0

  • Size

    1.1MB

  • Sample

    230513-qd3c8sae71

  • MD5

    0c158c8131d7342d367cddead002c8d0

  • SHA1

    e1b1524857f1e4ae6ea9408e27529b3daaac636e

  • SHA256

    ba401da0d62d69b098447b5a07772436f599269929429a61f9a85f6857a66ab0

  • SHA512

    4d6efc3bbad918666cc1ecd03d7964b0cd01e0943ba83daa60171c34a8cb3ef96448926c371255ab4a122318af821c2b971965a88dc54e074cfe60aa50c4a2bb

  • SSDEEP

    24576:zybaVV9byzVhnUeX9+I+eNfKgRDAyU1x7Ssra4c6vwEDURuc2/WH:G2VmzXUeXx+eNfzATtO43nG92/

Malware Config

Extracted

Family

redline

Botnet

miran

C2

185.161.248.75:4132

Attributes
  • auth_value

    f1084732cb99b2cbe314a2a565371e6c

Extracted

Family

redline

Botnet

raven

C2

185.161.248.75:4132

Attributes
  • auth_value

    8b22c01d6173ecee1376933bc63c6028

Targets

    • Target

      ba401da0d62d69b098447b5a07772436f599269929429a61f9a85f6857a66ab0

    • Size

      1.1MB

    • MD5

      0c158c8131d7342d367cddead002c8d0

    • SHA1

      e1b1524857f1e4ae6ea9408e27529b3daaac636e

    • SHA256

      ba401da0d62d69b098447b5a07772436f599269929429a61f9a85f6857a66ab0

    • SHA512

      4d6efc3bbad918666cc1ecd03d7964b0cd01e0943ba83daa60171c34a8cb3ef96448926c371255ab4a122318af821c2b971965a88dc54e074cfe60aa50c4a2bb

    • SSDEEP

      24576:zybaVV9byzVhnUeX9+I+eNfKgRDAyU1x7Ssra4c6vwEDURuc2/WH:G2VmzXUeXx+eNfzATtO43nG92/

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks