General

  • Target

    000ebc299ae6214ae4e712ac6ec7f8ba596ec146283ca532cd7305876fb09edc

  • Size

    1.1MB

  • Sample

    230514-amarksaa85

  • MD5

    6447b8c12b63c9450847b11fa93c1909

  • SHA1

    b360d088cd06a402e822e766bd1076d98e8bf6b6

  • SHA256

    000ebc299ae6214ae4e712ac6ec7f8ba596ec146283ca532cd7305876fb09edc

  • SHA512

    416bae23daafb3859268fa2e0f78ab3be60bf39aa81cb7073f6714d0ac8ea4bd93e95d092697d47f49e83d9749ed368a8be52358079182048ea674a124aa80dd

  • SSDEEP

    24576:0y2SsX8go3LDTS1bTIEJ3NK9CJcBnfyxIhFfogoRY:DFsJoHmC2c0O4M5o

Malware Config

Extracted

Family

redline

Botnet

motor

C2

185.161.248.75:4132

Attributes
  • auth_value

    ec19ab9989a783983c5cbbc0e5ac4a5f

Extracted

Family

redline

Botnet

terra

C2

185.161.248.75:4132

Attributes
  • auth_value

    60df3f535f8aa4e264f78041983592d2

Targets

    • Target

      000ebc299ae6214ae4e712ac6ec7f8ba596ec146283ca532cd7305876fb09edc

    • Size

      1.1MB

    • MD5

      6447b8c12b63c9450847b11fa93c1909

    • SHA1

      b360d088cd06a402e822e766bd1076d98e8bf6b6

    • SHA256

      000ebc299ae6214ae4e712ac6ec7f8ba596ec146283ca532cd7305876fb09edc

    • SHA512

      416bae23daafb3859268fa2e0f78ab3be60bf39aa81cb7073f6714d0ac8ea4bd93e95d092697d47f49e83d9749ed368a8be52358079182048ea674a124aa80dd

    • SSDEEP

      24576:0y2SsX8go3LDTS1bTIEJ3NK9CJcBnfyxIhFfogoRY:DFsJoHmC2c0O4M5o

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks