General

  • Target

    c57917bbfb117a3ba18c7c591f9a6f240cb4299ffce152bce05baa28684933fa

  • Size

    1.1MB

  • Sample

    230515-jxggjshg4v

  • MD5

    d0f64ccd52179cabe1628085035ea938

  • SHA1

    852f1ec092a4b86bc3e9acccebf237f631ecb3f1

  • SHA256

    c57917bbfb117a3ba18c7c591f9a6f240cb4299ffce152bce05baa28684933fa

  • SHA512

    6fe06d03acf9f41dbb3ae79dfe467dd3672139dea5ef1ba19f7467473ec0eca8ded9d5afcaf7e34f99080dc726ad9d0faf9baa8bc146b675de745c5e4b8e4681

  • SSDEEP

    24576:8yDLCCvnTEFjq9dmjrOUWpG689O3GWCKsz+a8P1C9ij3ZYXvImj4:rDuGuGTmjqUWpNqJz+a8PZN2vV

Malware Config

Extracted

Family

redline

Botnet

lopuh

C2

185.161.248.75:4132

Attributes
  • auth_value

    5852b05de9da526581993068a4e7e915

Extracted

Family

redline

Botnet

horor

C2

185.161.248.75:4132

Attributes
  • auth_value

    b8d506fe48db15c38fb031d07f42d529

Targets

    • Target

      c57917bbfb117a3ba18c7c591f9a6f240cb4299ffce152bce05baa28684933fa

    • Size

      1.1MB

    • MD5

      d0f64ccd52179cabe1628085035ea938

    • SHA1

      852f1ec092a4b86bc3e9acccebf237f631ecb3f1

    • SHA256

      c57917bbfb117a3ba18c7c591f9a6f240cb4299ffce152bce05baa28684933fa

    • SHA512

      6fe06d03acf9f41dbb3ae79dfe467dd3672139dea5ef1ba19f7467473ec0eca8ded9d5afcaf7e34f99080dc726ad9d0faf9baa8bc146b675de745c5e4b8e4681

    • SSDEEP

      24576:8yDLCCvnTEFjq9dmjrOUWpG689O3GWCKsz+a8P1C9ij3ZYXvImj4:rDuGuGTmjqUWpNqJz+a8PZN2vV

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks