General

  • Target

    d733cfb27f62976fc1766c224d7d54d82d4ba0cadc84efb33970cd6c0715a258.exe

  • Size

    1.1MB

  • Sample

    230514-w79x3ach74

  • MD5

    d7e467f7c16c3bbc652bf74b4e24def2

  • SHA1

    dbd531d93bb3e243e13de5fb0ca26b45a42597a7

  • SHA256

    d733cfb27f62976fc1766c224d7d54d82d4ba0cadc84efb33970cd6c0715a258

  • SHA512

    0d2a37738c9d6d14c36b1b00cad3fee9cacd21d29f2a6794f0cfb87faef4d691d40396182aeeb7337cd4bd8539300814cc115431ee598e0ee249de0b3e7b1210

  • SSDEEP

    24576:lyNyW4PEV26Du6KE8CpHXx7nZWHfCD0QguXHNrIIlCM:ANyWv26Du6mOVnybuXNrFl

Malware Config

Extracted

Family

redline

Botnet

dogma

C2

185.161.248.75:4132

Attributes
  • auth_value

    d6c5d36e9aa03c956dc76aa0fcbe3639

Extracted

Family

redline

Botnet

terra

C2

185.161.248.75:4132

Attributes
  • auth_value

    60df3f535f8aa4e264f78041983592d2

Targets

    • Target

      d733cfb27f62976fc1766c224d7d54d82d4ba0cadc84efb33970cd6c0715a258.exe

    • Size

      1.1MB

    • MD5

      d7e467f7c16c3bbc652bf74b4e24def2

    • SHA1

      dbd531d93bb3e243e13de5fb0ca26b45a42597a7

    • SHA256

      d733cfb27f62976fc1766c224d7d54d82d4ba0cadc84efb33970cd6c0715a258

    • SHA512

      0d2a37738c9d6d14c36b1b00cad3fee9cacd21d29f2a6794f0cfb87faef4d691d40396182aeeb7337cd4bd8539300814cc115431ee598e0ee249de0b3e7b1210

    • SSDEEP

      24576:lyNyW4PEV26Du6KE8CpHXx7nZWHfCD0QguXHNrIIlCM:ANyWv26Du6mOVnybuXNrFl

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks