General

  • Target

    25268619c4d290dd8fb6611da290468cd42b56c9d9cc39ce65cc03023439881a

  • Size

    1.1MB

  • Sample

    230515-h7v71shf2z

  • MD5

    04aa99f89bfc5bf61daf9449c55db3a2

  • SHA1

    ea4e5c467adf6f46d5026e163f40b93cee25f152

  • SHA256

    25268619c4d290dd8fb6611da290468cd42b56c9d9cc39ce65cc03023439881a

  • SHA512

    5ebfd55ef6a1cfa421cc7dbc79048be21041ad7a82f62c34cbf0e0d82b5e82a0e4a844566ba431333dca7765e89c0ce86ce5c67848154b068c69f7c27b138330

  • SSDEEP

    24576:kylyR8qsU7q9LnBQpYsmeeU5utIGEgcZqrdm9t5XdeCju:z4R8q+9LnXsmPouewmTXj

Malware Config

Extracted

Family

redline

Botnet

muza

C2

185.161.248.75:4132

Attributes
  • auth_value

    99f39e1ac98e0c0a729ab27594e72bc3

Extracted

Family

redline

Botnet

rumba

C2

185.161.248.75:4132

Attributes
  • auth_value

    35dbb4006087a5d5c211b21be41adb90

Targets

    • Target

      25268619c4d290dd8fb6611da290468cd42b56c9d9cc39ce65cc03023439881a

    • Size

      1.1MB

    • MD5

      04aa99f89bfc5bf61daf9449c55db3a2

    • SHA1

      ea4e5c467adf6f46d5026e163f40b93cee25f152

    • SHA256

      25268619c4d290dd8fb6611da290468cd42b56c9d9cc39ce65cc03023439881a

    • SHA512

      5ebfd55ef6a1cfa421cc7dbc79048be21041ad7a82f62c34cbf0e0d82b5e82a0e4a844566ba431333dca7765e89c0ce86ce5c67848154b068c69f7c27b138330

    • SSDEEP

      24576:kylyR8qsU7q9LnBQpYsmeeU5utIGEgcZqrdm9t5XdeCju:z4R8q+9LnXsmPouewmTXj

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks