General

  • Target

    2d182f102d813b63ef3dc49b2a892dbfc1a4068c3c67fa195ff1a6f7f2240ec6

  • Size

    1.1MB

  • Sample

    230515-gjhrcahc21

  • MD5

    afa943f3b7e6d2f007dfafc8fff431cf

  • SHA1

    dec26233a3cd3d438ed08e061df310b6a9b1bbcc

  • SHA256

    2d182f102d813b63ef3dc49b2a892dbfc1a4068c3c67fa195ff1a6f7f2240ec6

  • SHA512

    95783360f110b6082f0b8347800f167267e75f18fb508e7a70c903fb225962e83e51b84501c92d7e0a117fba2cf85ee1bab9702f65c8246e2fa6da0d041133db

  • SSDEEP

    24576:JySBB+KzJqSpK/de/mmmohyiKepXWAdLIv503ksASEdnL7k8JhHmjibb4Cj:8SU/4/6KyiK1AdL403ksAndrmj

Malware Config

Extracted

Family

redline

Botnet

muza

C2

185.161.248.75:4132

Attributes
  • auth_value

    99f39e1ac98e0c0a729ab27594e72bc3

Extracted

Family

redline

Botnet

horor

C2

185.161.248.75:4132

Attributes
  • auth_value

    b8d506fe48db15c38fb031d07f42d529

Targets

    • Target

      2d182f102d813b63ef3dc49b2a892dbfc1a4068c3c67fa195ff1a6f7f2240ec6

    • Size

      1.1MB

    • MD5

      afa943f3b7e6d2f007dfafc8fff431cf

    • SHA1

      dec26233a3cd3d438ed08e061df310b6a9b1bbcc

    • SHA256

      2d182f102d813b63ef3dc49b2a892dbfc1a4068c3c67fa195ff1a6f7f2240ec6

    • SHA512

      95783360f110b6082f0b8347800f167267e75f18fb508e7a70c903fb225962e83e51b84501c92d7e0a117fba2cf85ee1bab9702f65c8246e2fa6da0d041133db

    • SSDEEP

      24576:JySBB+KzJqSpK/de/mmmohyiKepXWAdLIv503ksASEdnL7k8JhHmjibb4Cj:8SU/4/6KyiK1AdL403ksAndrmj

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks