General

  • Target

    63bb10735a9d54e9781d9df30da648d611a219499970a7f07622ba17d489287d

  • Size

    1.1MB

  • Sample

    230513-tazpqaba2s

  • MD5

    3e68adf4da29acfe49c13de79b6a63e0

  • SHA1

    58bf2233308cd428b826f647b7a6092a68d49d84

  • SHA256

    63bb10735a9d54e9781d9df30da648d611a219499970a7f07622ba17d489287d

  • SHA512

    50ac05b9bb61b83490f9dcfc2473fa7e12dce47c3f95a6a7551cb92c4cf1ad6e79189531d7d9148f27bb764cd46eb28c1871ea6666879d72e49b4dfebf6778a7

  • SSDEEP

    24576:/yRDui1gZEwTxrsYd8TaQazO40SxtG7zZ6dGbC6l+8cPBgyIU:KI5dDIJazAkddQC6Ag

Malware Config

Extracted

Family

redline

Botnet

dizan

C2

185.161.248.75:4132

Attributes
  • auth_value

    b14d665c7bca8407646527036302d70c

Extracted

Family

redline

Botnet

raven

C2

185.161.248.75:4132

Attributes
  • auth_value

    8b22c01d6173ecee1376933bc63c6028

Targets

    • Target

      63bb10735a9d54e9781d9df30da648d611a219499970a7f07622ba17d489287d

    • Size

      1.1MB

    • MD5

      3e68adf4da29acfe49c13de79b6a63e0

    • SHA1

      58bf2233308cd428b826f647b7a6092a68d49d84

    • SHA256

      63bb10735a9d54e9781d9df30da648d611a219499970a7f07622ba17d489287d

    • SHA512

      50ac05b9bb61b83490f9dcfc2473fa7e12dce47c3f95a6a7551cb92c4cf1ad6e79189531d7d9148f27bb764cd46eb28c1871ea6666879d72e49b4dfebf6778a7

    • SSDEEP

      24576:/yRDui1gZEwTxrsYd8TaQazO40SxtG7zZ6dGbC6l+8cPBgyIU:KI5dDIJazAkddQC6Ag

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks