General

  • Target

    a537680a1b3a8beb51e1f17eda8b2c95d7bb06d1cb86453df0a3072412a51395

  • Size

    1.1MB

  • Sample

    230513-zzbl3shd27

  • MD5

    551968247d18fd241a4f41a3329d4db8

  • SHA1

    3249756521a2ac387d4c02e75fb21f715fdcdda6

  • SHA256

    a537680a1b3a8beb51e1f17eda8b2c95d7bb06d1cb86453df0a3072412a51395

  • SHA512

    3195d969f08cc4c96d79e90a04c28bc6ea4fce3ca5da576416d3f6677dfa5a50bcc0cbf075f8a6640cd886ef1adeafe6464a28068a813716f45cd7037cabed56

  • SSDEEP

    24576:yyuMc3yxCE5U79tWqDUdOfsi6aij2FYH/3nDo6W:Zdt5UuqAkfsi6YFyPnD

Malware Config

Extracted

Family

redline

Botnet

motor

C2

185.161.248.75:4132

Attributes
  • auth_value

    ec19ab9989a783983c5cbbc0e5ac4a5f

Extracted

Family

redline

Botnet

terra

C2

185.161.248.75:4132

Attributes
  • auth_value

    60df3f535f8aa4e264f78041983592d2

Targets

    • Target

      a537680a1b3a8beb51e1f17eda8b2c95d7bb06d1cb86453df0a3072412a51395

    • Size

      1.1MB

    • MD5

      551968247d18fd241a4f41a3329d4db8

    • SHA1

      3249756521a2ac387d4c02e75fb21f715fdcdda6

    • SHA256

      a537680a1b3a8beb51e1f17eda8b2c95d7bb06d1cb86453df0a3072412a51395

    • SHA512

      3195d969f08cc4c96d79e90a04c28bc6ea4fce3ca5da576416d3f6677dfa5a50bcc0cbf075f8a6640cd886ef1adeafe6464a28068a813716f45cd7037cabed56

    • SSDEEP

      24576:yyuMc3yxCE5U79tWqDUdOfsi6aij2FYH/3nDo6W:Zdt5UuqAkfsi6YFyPnD

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.