General

  • Target

    8bb911b96ed2c9ff118ceaa0a850b07edb98379607415e20dac6471d1aef7f33

  • Size

    1.1MB

  • Sample

    230514-mqcrkaea2v

  • MD5

    66d42ef7d4d672e37076007d7c4ab94d

  • SHA1

    2b7d267958554b50370cd4168bf1f26105aa2158

  • SHA256

    8bb911b96ed2c9ff118ceaa0a850b07edb98379607415e20dac6471d1aef7f33

  • SHA512

    5d05a1ba0969460e76fcd4d6230eb55b102babe8abc24817af864e10bd2b38d1b11f6f0328ae606cbcf69e268e3cc5534bb6358b5abec221297840e407fde213

  • SSDEEP

    24576:RyIwMFNg2d4tnD7M+napmMBJ8e4koQoCVVANoqJ5nL:E6Nnd+7n2O879AN

Malware Config

Extracted

Family

redline

Botnet

larry

C2

185.161.248.75:4132

Attributes
  • auth_value

    9039557bb7a08f5f2f60e2b71e1dee0e

Extracted

Family

redline

Botnet

warum

C2

185.161.248.75:4132

Attributes
  • auth_value

    0bdb2dda91dadc65f555dee088a6a2a4

Targets

    • Target

      8bb911b96ed2c9ff118ceaa0a850b07edb98379607415e20dac6471d1aef7f33

    • Size

      1.1MB

    • MD5

      66d42ef7d4d672e37076007d7c4ab94d

    • SHA1

      2b7d267958554b50370cd4168bf1f26105aa2158

    • SHA256

      8bb911b96ed2c9ff118ceaa0a850b07edb98379607415e20dac6471d1aef7f33

    • SHA512

      5d05a1ba0969460e76fcd4d6230eb55b102babe8abc24817af864e10bd2b38d1b11f6f0328ae606cbcf69e268e3cc5534bb6358b5abec221297840e407fde213

    • SSDEEP

      24576:RyIwMFNg2d4tnD7M+napmMBJ8e4koQoCVVANoqJ5nL:E6Nnd+7n2O879AN

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks