General

  • Target

    ec6b1a9612f5e6c9f72ce86531826e34757c567b3251562d1ea1460fef28b107

  • Size

    1.1MB

  • Sample

    230514-t3db7acd94

  • MD5

    6dda4fb192587e735a46f8b352fff068

  • SHA1

    c4ec9a0e321abe3d90be3ddf190951963478563d

  • SHA256

    ec6b1a9612f5e6c9f72ce86531826e34757c567b3251562d1ea1460fef28b107

  • SHA512

    a29c29449af64f5dd9eaca1cad7522c611a7baf2ea61d2744289ec6a92ad4bd755ed7af6076cad2d14c8a550c6f547ab122a2ef9b56789b6f3466c9143832794

  • SSDEEP

    24576:eyv5rmO6f2Xdm7J5va2V1Ng77r8EN0rOpslVCG/Q:tRmOXdm7JpanrKrOilb

Malware Config

Extracted

Family

redline

Botnet

larry

C2

185.161.248.75:4132

Attributes
  • auth_value

    9039557bb7a08f5f2f60e2b71e1dee0e

Extracted

Family

redline

Botnet

warum

C2

185.161.248.75:4132

Attributes
  • auth_value

    0bdb2dda91dadc65f555dee088a6a2a4

Extracted

Family

redline

C2

37.220.87.13:48790

Attributes
  • auth_value

    99262e812dcb95475f78d93e77141920

Targets

    • Target

      ec6b1a9612f5e6c9f72ce86531826e34757c567b3251562d1ea1460fef28b107

    • Size

      1.1MB

    • MD5

      6dda4fb192587e735a46f8b352fff068

    • SHA1

      c4ec9a0e321abe3d90be3ddf190951963478563d

    • SHA256

      ec6b1a9612f5e6c9f72ce86531826e34757c567b3251562d1ea1460fef28b107

    • SHA512

      a29c29449af64f5dd9eaca1cad7522c611a7baf2ea61d2744289ec6a92ad4bd755ed7af6076cad2d14c8a550c6f547ab122a2ef9b56789b6f3466c9143832794

    • SSDEEP

      24576:eyv5rmO6f2Xdm7J5va2V1Ng77r8EN0rOpslVCG/Q:tRmOXdm7JpanrKrOilb

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks