General

  • Target

    eeb4103e2ed539b2e213b068bd9b4ac7d711c0b384f79ab98acbbd894b9b5c17

  • Size

    1.1MB

  • Sample

    230515-kw7g1sfe59

  • MD5

    70a57372c48f0edfe59ebe5df24bbd81

  • SHA1

    da42012d341b89fac8fc1c67627abf2605b03b72

  • SHA256

    eeb4103e2ed539b2e213b068bd9b4ac7d711c0b384f79ab98acbbd894b9b5c17

  • SHA512

    538cf1abc59b8368594fac41765661caf6db5b99413367e6a61eb4be190c66c07e77ccf9e9da44b16a64918d781bac7742b31eff4e7b336be2c7c0e3f262747a

  • SSDEEP

    24576:byfX2CbOqkyNJHJyM9oOaAVYn5uWtZmtc6UFlOngeHtSZ:OPvy1EHJoAVYnIWtZmrUFlOnN

Malware Config

Extracted

Family

redline

Botnet

masha

C2

185.161.248.75:4132

Attributes
  • auth_value

    12fb859bf78abd5eb21bfe471024dffb

Extracted

Family

redline

Botnet

manka

C2

185.161.248.75:4132

Attributes
  • auth_value

    d94715c55e1c02ef0aa67081d47a0c1f

Targets

    • Target

      eeb4103e2ed539b2e213b068bd9b4ac7d711c0b384f79ab98acbbd894b9b5c17

    • Size

      1.1MB

    • MD5

      70a57372c48f0edfe59ebe5df24bbd81

    • SHA1

      da42012d341b89fac8fc1c67627abf2605b03b72

    • SHA256

      eeb4103e2ed539b2e213b068bd9b4ac7d711c0b384f79ab98acbbd894b9b5c17

    • SHA512

      538cf1abc59b8368594fac41765661caf6db5b99413367e6a61eb4be190c66c07e77ccf9e9da44b16a64918d781bac7742b31eff4e7b336be2c7c0e3f262747a

    • SSDEEP

      24576:byfX2CbOqkyNJHJyM9oOaAVYn5uWtZmtc6UFlOngeHtSZ:OPvy1EHJoAVYnIWtZmrUFlOnN

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks