General

  • Target

    6b7cb8db500ca284d37aa879d349ff3365998b0195dcc20487aa868c03071720

  • Size

    1.1MB

  • Sample

    230515-lmelbaff53

  • MD5

    735b467f5dfb9ca634b8d743ea9597e9

  • SHA1

    8f741b749e88f5cb53ad13db01e6d651595b69a0

  • SHA256

    6b7cb8db500ca284d37aa879d349ff3365998b0195dcc20487aa868c03071720

  • SHA512

    a934528d59ec5ca7e1547fc6a1f4db40367b26cfabca0b72e303382baa1580704e0bc4e270be3c89cdfb3fe5e549abc8ffc89ad954e484712f5d382c4e78d31a

  • SSDEEP

    24576:CyLdcSWbBf7bfLnL5mgSiisM0n5Ld6RqjEgoJC9Mww7s:pLK5HjL5mQN1RMwK

Malware Config

Extracted

Family

redline

Botnet

lays

C2

185.161.248.75:4132

Attributes
  • auth_value

    239cb507c4bb32e630b1bee63365fe29

Extracted

Family

redline

Botnet

manka

C2

185.161.248.75:4132

Attributes
  • auth_value

    d94715c55e1c02ef0aa67081d47a0c1f

Targets

    • Target

      6b7cb8db500ca284d37aa879d349ff3365998b0195dcc20487aa868c03071720

    • Size

      1.1MB

    • MD5

      735b467f5dfb9ca634b8d743ea9597e9

    • SHA1

      8f741b749e88f5cb53ad13db01e6d651595b69a0

    • SHA256

      6b7cb8db500ca284d37aa879d349ff3365998b0195dcc20487aa868c03071720

    • SHA512

      a934528d59ec5ca7e1547fc6a1f4db40367b26cfabca0b72e303382baa1580704e0bc4e270be3c89cdfb3fe5e549abc8ffc89ad954e484712f5d382c4e78d31a

    • SSDEEP

      24576:CyLdcSWbBf7bfLnL5mgSiisM0n5Ld6RqjEgoJC9Mww7s:pLK5HjL5mQN1RMwK

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks