General

  • Target

    e3dae19f3a5f86e90bce473a5a4b572afe0b0443354d228b9a717d23bf3258e1

  • Size

    1.1MB

  • Sample

    230515-pgqyyadf6y

  • MD5

    25f43d2b676cbc5f60a99fedf1fb3d64

  • SHA1

    32175e9bc41fe919b8cef10f8e6a021378e13611

  • SHA256

    e3dae19f3a5f86e90bce473a5a4b572afe0b0443354d228b9a717d23bf3258e1

  • SHA512

    b16e5837485ac08b8f9418f92b6dece3ebda3bc54cf3cccde7c6c181f7613782574777f5405dc65a27c2c7d03fb975b3b1e40a96f35214ab1808f5ed0262d6fa

  • SSDEEP

    24576:SyWSE00yGJxncECgUHc9EbCcp3gKF3YkFxx+KHWR6tdgz:530XwbgYc9EbCy3gAsKN

Malware Config

Extracted

Family

redline

Botnet

ment

C2

185.161.248.25:4132

Attributes
  • auth_value

    650f2fd9e43f18bed6e23c78d8cfb0af

Extracted

Family

redline

Botnet

naher

C2

185.161.248.25:4132

Attributes
  • auth_value

    91f06fcf80f600c56b2797e1c73d214d

Targets

    • Target

      e3dae19f3a5f86e90bce473a5a4b572afe0b0443354d228b9a717d23bf3258e1

    • Size

      1.1MB

    • MD5

      25f43d2b676cbc5f60a99fedf1fb3d64

    • SHA1

      32175e9bc41fe919b8cef10f8e6a021378e13611

    • SHA256

      e3dae19f3a5f86e90bce473a5a4b572afe0b0443354d228b9a717d23bf3258e1

    • SHA512

      b16e5837485ac08b8f9418f92b6dece3ebda3bc54cf3cccde7c6c181f7613782574777f5405dc65a27c2c7d03fb975b3b1e40a96f35214ab1808f5ed0262d6fa

    • SSDEEP

      24576:SyWSE00yGJxncECgUHc9EbCcp3gKF3YkFxx+KHWR6tdgz:530XwbgYc9EbCy3gAsKN

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks