General

  • Target

    caa853879515b9bac1d01ba0081771d417f8424bfc200f97a5fee794af09cea6

  • Size

    1.1MB

  • Sample

    230514-wc2yzacf43

  • MD5

    7fb59a99a2639ecbb66cc2fe07d58228

  • SHA1

    9e19577789206faca41e42536df197f91d9fc583

  • SHA256

    caa853879515b9bac1d01ba0081771d417f8424bfc200f97a5fee794af09cea6

  • SHA512

    fb83211110fb4ce319ad5eabf97fc1034340c77682474d1579bb467546d2122a6f2acc082283081ec8cbfc10e85fda50196d7fe9bb397e432875f2d0c1842a9c

  • SSDEEP

    24576:kyr8v2esWUN0oE9bh0vkNDfRm9z6iW0fP84Ld/5DfXKUNXkE8VUF1vsJCU5:zr8+eGnobhIK09eiW0nfd/5DSwX2UFy

Malware Config

Extracted

Family

redline

Botnet

muza

C2

185.161.248.75:4132

Attributes
  • auth_value

    99f39e1ac98e0c0a729ab27594e72bc3

Extracted

Family

redline

Botnet

horor

C2

185.161.248.75:4132

Attributes
  • auth_value

    b8d506fe48db15c38fb031d07f42d529

Targets

    • Target

      caa853879515b9bac1d01ba0081771d417f8424bfc200f97a5fee794af09cea6

    • Size

      1.1MB

    • MD5

      7fb59a99a2639ecbb66cc2fe07d58228

    • SHA1

      9e19577789206faca41e42536df197f91d9fc583

    • SHA256

      caa853879515b9bac1d01ba0081771d417f8424bfc200f97a5fee794af09cea6

    • SHA512

      fb83211110fb4ce319ad5eabf97fc1034340c77682474d1579bb467546d2122a6f2acc082283081ec8cbfc10e85fda50196d7fe9bb397e432875f2d0c1842a9c

    • SSDEEP

      24576:kyr8v2esWUN0oE9bh0vkNDfRm9z6iW0fP84Ld/5DfXKUNXkE8VUF1vsJCU5:zr8+eGnobhIK09eiW0nfd/5DSwX2UFy

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks