General

  • Target

    e8199ad8327beb1b35f45fdd92b956df1859d023d07a6e940ab9777a720f841a

  • Size

    1.1MB

  • Sample

    230514-zrrckade88

  • MD5

    1e1a4b0870cc4c476d937a8442b5517b

  • SHA1

    a2d0f55809b7ce2a6ab10e642e032ecad63c8543

  • SHA256

    e8199ad8327beb1b35f45fdd92b956df1859d023d07a6e940ab9777a720f841a

  • SHA512

    78a3bdd6efb2f3d97be67e3ee683a8c2cc199c4124459b991f5fbb94706975ca2059b5a949b9ee3a06d7c8a0d99bef4c16b8a0cdf7299cbc9e7498c386111441

  • SSDEEP

    24576:wyvApKnfD+VN0kUbpyed42ROP4+pmk2zg9NapMW3RL3DHYl/B:3v4KnfqVqk+zdbRY4+pm/gipbtQ

Malware Config

Extracted

Family

redline

Botnet

muza

C2

185.161.248.75:4132

Attributes
  • auth_value

    99f39e1ac98e0c0a729ab27594e72bc3

Extracted

Family

redline

Botnet

horor

C2

185.161.248.75:4132

Attributes
  • auth_value

    b8d506fe48db15c38fb031d07f42d529

Targets

    • Target

      e8199ad8327beb1b35f45fdd92b956df1859d023d07a6e940ab9777a720f841a

    • Size

      1.1MB

    • MD5

      1e1a4b0870cc4c476d937a8442b5517b

    • SHA1

      a2d0f55809b7ce2a6ab10e642e032ecad63c8543

    • SHA256

      e8199ad8327beb1b35f45fdd92b956df1859d023d07a6e940ab9777a720f841a

    • SHA512

      78a3bdd6efb2f3d97be67e3ee683a8c2cc199c4124459b991f5fbb94706975ca2059b5a949b9ee3a06d7c8a0d99bef4c16b8a0cdf7299cbc9e7498c386111441

    • SSDEEP

      24576:wyvApKnfD+VN0kUbpyed42ROP4+pmk2zg9NapMW3RL3DHYl/B:3v4KnfqVqk+zdbRY4+pm/gipbtQ

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks