General

  • Target

    eeb8aa6df6eda9ee6e2f1a0442fbbb6b57bf471d6c58eddcac00845ad5c24510.exe

  • Size

    1.1MB

  • Sample

    230514-xabjnsfc6s

  • MD5

    8f1f8eaf0488cf2110f4bbff3766fc03

  • SHA1

    c750ba51489eca23c3515e88385cd0bc8d66660e

  • SHA256

    eeb8aa6df6eda9ee6e2f1a0442fbbb6b57bf471d6c58eddcac00845ad5c24510

  • SHA512

    6d366a89f30db672b1d0bc477fa9e28c0c31dff4884457d3181aa01b4da692d35c0d273fcd0300414045bc3db7edfa8a6c8b2fc50bc8b8f4d3cf302cf1560d0c

  • SSDEEP

    24576:0yW9TIlYc0KZ6IvYkGl/lSAL0eAB9LFCY:DW9TIlYNCYkGl/MU07xC

Malware Config

Extracted

Family

redline

Botnet

dogma

C2

185.161.248.75:4132

Attributes
  • auth_value

    d6c5d36e9aa03c956dc76aa0fcbe3639

Extracted

Family

redline

Botnet

terra

C2

185.161.248.75:4132

Attributes
  • auth_value

    60df3f535f8aa4e264f78041983592d2

Targets

    • Target

      eeb8aa6df6eda9ee6e2f1a0442fbbb6b57bf471d6c58eddcac00845ad5c24510.exe

    • Size

      1.1MB

    • MD5

      8f1f8eaf0488cf2110f4bbff3766fc03

    • SHA1

      c750ba51489eca23c3515e88385cd0bc8d66660e

    • SHA256

      eeb8aa6df6eda9ee6e2f1a0442fbbb6b57bf471d6c58eddcac00845ad5c24510

    • SHA512

      6d366a89f30db672b1d0bc477fa9e28c0c31dff4884457d3181aa01b4da692d35c0d273fcd0300414045bc3db7edfa8a6c8b2fc50bc8b8f4d3cf302cf1560d0c

    • SSDEEP

      24576:0yW9TIlYc0KZ6IvYkGl/lSAL0eAB9LFCY:DW9TIlYNCYkGl/MU07xC

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks