General

  • Target

    5541609924fdc054ce123eac0c1651d2ca2f85ff8f2f89a883599ca542131c01

  • Size

    1.1MB

  • Sample

    230514-yj431sff5v

  • MD5

    04984482d3aeeeb3bebe131de65fd891

  • SHA1

    e2ed149d973158e2cf594b2524297679de3a4af6

  • SHA256

    5541609924fdc054ce123eac0c1651d2ca2f85ff8f2f89a883599ca542131c01

  • SHA512

    235d1474fee1299c3b1194d73f1f07ec4ffb8248f184adcb33cb331521fcd60d9da8f8dc85784cbb954f1ae02f4f5cfe6b174b779bf1e2f636e5d145dca9386a

  • SSDEEP

    24576:tyDy3x8Hp1hQAn/EtMPNO2jQkE/+il6pB9pq7yWjR22aSIkr75rWR:IUMAA/2MXQkEGNB9pEjR23SIK

Malware Config

Extracted

Family

redline

Botnet

linda

C2

185.161.248.75:4132

Attributes
  • auth_value

    21cdc21d041667b9c1679f88a1146770

Extracted

Family

redline

Botnet

horor

C2

185.161.248.75:4132

Attributes
  • auth_value

    b8d506fe48db15c38fb031d07f42d529

Targets

    • Target

      5541609924fdc054ce123eac0c1651d2ca2f85ff8f2f89a883599ca542131c01

    • Size

      1.1MB

    • MD5

      04984482d3aeeeb3bebe131de65fd891

    • SHA1

      e2ed149d973158e2cf594b2524297679de3a4af6

    • SHA256

      5541609924fdc054ce123eac0c1651d2ca2f85ff8f2f89a883599ca542131c01

    • SHA512

      235d1474fee1299c3b1194d73f1f07ec4ffb8248f184adcb33cb331521fcd60d9da8f8dc85784cbb954f1ae02f4f5cfe6b174b779bf1e2f636e5d145dca9386a

    • SSDEEP

      24576:tyDy3x8Hp1hQAn/EtMPNO2jQkE/+il6pB9pq7yWjR22aSIkr75rWR:IUMAA/2MXQkEGNB9pEjR23SIK

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks