General

  • Target

    d1e0b6ef31d08705ebc0beca7afdda064a188817f7baedebf1073bca6cfa1dc9.exe

  • Size

    1.1MB

  • Sample

    230514-w774gafb4x

  • MD5

    4ba33ae76ea957d8ba1f5305f19d699e

  • SHA1

    2b1f32d058e7c4fb3daa02d2cf5324ccdac353f3

  • SHA256

    d1e0b6ef31d08705ebc0beca7afdda064a188817f7baedebf1073bca6cfa1dc9

  • SHA512

    c78577d8250bf0df996a378376e298db65cb676cbc647bede2481dea4cd19ad826d063471a3a2f4da3504f32cfcb31d54c29032aaf8c5610787c6588296f19f9

  • SSDEEP

    24576:By7GgBRLRRMEkPPP22a5o6uGo0Ve7O2/mopAzlnpn4vbY3:0JBlROEkPn2z5WGo0VYeBnmvbY

Malware Config

Extracted

Family

redline

Botnet

mizer

C2

185.161.248.75:4132

Attributes
  • auth_value

    353ae46e71ea5671b9ed097b65a8a2be

Extracted

Family

redline

Botnet

fuga

C2

185.161.248.75:4132

Attributes
  • auth_value

    7c5144ad645deb9fa21680fdaee0d51f

Targets

    • Target

      d1e0b6ef31d08705ebc0beca7afdda064a188817f7baedebf1073bca6cfa1dc9.exe

    • Size

      1.1MB

    • MD5

      4ba33ae76ea957d8ba1f5305f19d699e

    • SHA1

      2b1f32d058e7c4fb3daa02d2cf5324ccdac353f3

    • SHA256

      d1e0b6ef31d08705ebc0beca7afdda064a188817f7baedebf1073bca6cfa1dc9

    • SHA512

      c78577d8250bf0df996a378376e298db65cb676cbc647bede2481dea4cd19ad826d063471a3a2f4da3504f32cfcb31d54c29032aaf8c5610787c6588296f19f9

    • SSDEEP

      24576:By7GgBRLRRMEkPPP22a5o6uGo0Ve7O2/mopAzlnpn4vbY3:0JBlROEkPn2z5WGo0VYeBnmvbY

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks