General

  • Target

    6d9cd2c6bcbdfa37fcb480eec8a78ea9e463b622782c60c58683bd1e69722f9f

  • Size

    1.1MB

  • Sample

    230514-vhycasce56

  • MD5

    4f03d8df4c695a836c585b0080911b62

  • SHA1

    17279be7d7da5c3ce098fba3e68bee2f4d6c0f6c

  • SHA256

    6d9cd2c6bcbdfa37fcb480eec8a78ea9e463b622782c60c58683bd1e69722f9f

  • SHA512

    87edb581261a324ba49ccd8da63f1ea3807be529b39f3cb72e254ed966ee3aea12635cec0b0f7cabc8a36e28752ce75ee3c07554d1b73d4d5807bfc9630f5003

  • SSDEEP

    24576:1y+SBEzlLnUVhBP3QPToTLXb/pMsaq8loKZIVnPVK/:Q7ERLnUVh+cTLXqRlr6VdK

Malware Config

Extracted

Family

redline

Botnet

messi

C2

185.161.248.75:4132

Attributes
  • auth_value

    b602b28664bb738e322d37baab91db28

Extracted

Family

redline

Botnet

warum

C2

185.161.248.75:4132

Attributes
  • auth_value

    0bdb2dda91dadc65f555dee088a6a2a4

Targets

    • Target

      6d9cd2c6bcbdfa37fcb480eec8a78ea9e463b622782c60c58683bd1e69722f9f

    • Size

      1.1MB

    • MD5

      4f03d8df4c695a836c585b0080911b62

    • SHA1

      17279be7d7da5c3ce098fba3e68bee2f4d6c0f6c

    • SHA256

      6d9cd2c6bcbdfa37fcb480eec8a78ea9e463b622782c60c58683bd1e69722f9f

    • SHA512

      87edb581261a324ba49ccd8da63f1ea3807be529b39f3cb72e254ed966ee3aea12635cec0b0f7cabc8a36e28752ce75ee3c07554d1b73d4d5807bfc9630f5003

    • SSDEEP

      24576:1y+SBEzlLnUVhBP3QPToTLXb/pMsaq8loKZIVnPVK/:Q7ERLnUVh+cTLXqRlr6VdK

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks