General

  • Target

    b4530c74f560bbb2a41cba747ca9b665ba13d17a84237584ed389df5a0e3de64

  • Size

    1.1MB

  • Sample

    230514-2kascadg85

  • MD5

    7a0285dbc866d1a76b687b94fe395560

  • SHA1

    8dca4ad2e5670252e59d328ef80821a5ded8e091

  • SHA256

    b4530c74f560bbb2a41cba747ca9b665ba13d17a84237584ed389df5a0e3de64

  • SHA512

    62707c8d3e65ef969b777f3877b6f7c882be9879bedf37c14f1d9b81519308f86b65ce070a2f557927510c1117d91720e420a129b2aa67876095f16b843508e7

  • SSDEEP

    24576:1ywECfXLJwXRTCtCQkuBWZ3sNgS70edq6ALr2t:Qcf+TUCQ/0Z3dq5dkr

Malware Config

Extracted

Family

redline

Botnet

linda

C2

185.161.248.75:4132

Attributes
  • auth_value

    21cdc21d041667b9c1679f88a1146770

Extracted

Family

redline

Botnet

horor

C2

185.161.248.75:4132

Attributes
  • auth_value

    b8d506fe48db15c38fb031d07f42d529

Targets

    • Target

      b4530c74f560bbb2a41cba747ca9b665ba13d17a84237584ed389df5a0e3de64

    • Size

      1.1MB

    • MD5

      7a0285dbc866d1a76b687b94fe395560

    • SHA1

      8dca4ad2e5670252e59d328ef80821a5ded8e091

    • SHA256

      b4530c74f560bbb2a41cba747ca9b665ba13d17a84237584ed389df5a0e3de64

    • SHA512

      62707c8d3e65ef969b777f3877b6f7c882be9879bedf37c14f1d9b81519308f86b65ce070a2f557927510c1117d91720e420a129b2aa67876095f16b843508e7

    • SSDEEP

      24576:1ywECfXLJwXRTCtCQkuBWZ3sNgS70edq6ALr2t:Qcf+TUCQ/0Z3dq5dkr

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks