General

  • Target

    bc16af353c4324833de8e35a5b85fc177621a9c0d7b54b984bc9bb4122d4e617

  • Size

    1.1MB

  • Sample

    230514-slhd5see7s

  • MD5

    eaecbb6e5a49cf98507eb94a5693d687

  • SHA1

    01ecd872a1cd11d3e765f856a86630e7d491af3d

  • SHA256

    bc16af353c4324833de8e35a5b85fc177621a9c0d7b54b984bc9bb4122d4e617

  • SHA512

    23f550da6a4030abaea4fe889981ff28953e6d3606b37f6ef7a43245160ea800162ef1945e157ecfb06d9dd99410b679bf7c3540bcdaf6b027609875bc91a7ef

  • SSDEEP

    24576:IyYS60MLxTYtYC+05PijTxwcWneLz4t+Rff+xRvHUx+CprDUsjvRu:Pi0iQ+WGNwci+pYJ4DL

Malware Config

Extracted

Family

redline

Botnet

larry

C2

185.161.248.75:4132

Attributes
  • auth_value

    9039557bb7a08f5f2f60e2b71e1dee0e

Extracted

Family

redline

Botnet

warum

C2

185.161.248.75:4132

Attributes
  • auth_value

    0bdb2dda91dadc65f555dee088a6a2a4

Targets

    • Target

      bc16af353c4324833de8e35a5b85fc177621a9c0d7b54b984bc9bb4122d4e617

    • Size

      1.1MB

    • MD5

      eaecbb6e5a49cf98507eb94a5693d687

    • SHA1

      01ecd872a1cd11d3e765f856a86630e7d491af3d

    • SHA256

      bc16af353c4324833de8e35a5b85fc177621a9c0d7b54b984bc9bb4122d4e617

    • SHA512

      23f550da6a4030abaea4fe889981ff28953e6d3606b37f6ef7a43245160ea800162ef1945e157ecfb06d9dd99410b679bf7c3540bcdaf6b027609875bc91a7ef

    • SSDEEP

      24576:IyYS60MLxTYtYC+05PijTxwcWneLz4t+Rff+xRvHUx+CprDUsjvRu:Pi0iQ+WGNwci+pYJ4DL

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks