General

  • Target

    f777bf91481451dbf187752339995ebbb9352d87464982d65eda6ed54397f4af

  • Size

    1.1MB

  • Sample

    230515-qde8psfe42

  • MD5

    68b1da3d7a7235f9228fc54b1f7c4651

  • SHA1

    90f35fe4c34ca049ab05dea7c127c70430f39bb2

  • SHA256

    f777bf91481451dbf187752339995ebbb9352d87464982d65eda6ed54397f4af

  • SHA512

    fe21cb1d8cc97ec075bec3875fb9a4ddc48eef9fcae867c1c188922efb49defeb340266b1057effab0444c49f59a0e4a365c486be0bb7c9e97537b5d0cab36f6

  • SSDEEP

    24576:+yslZk4L+yfp1fs4pHNobPYML8TMHiFmc9:N94B1EQtoNHa

Malware Config

Extracted

Family

redline

Botnet

ment

C2

185.161.248.25:4132

Attributes
  • auth_value

    650f2fd9e43f18bed6e23c78d8cfb0af

Extracted

Family

redline

Botnet

naher

C2

185.161.248.25:4132

Attributes
  • auth_value

    91f06fcf80f600c56b2797e1c73d214d

Targets

    • Target

      f777bf91481451dbf187752339995ebbb9352d87464982d65eda6ed54397f4af

    • Size

      1.1MB

    • MD5

      68b1da3d7a7235f9228fc54b1f7c4651

    • SHA1

      90f35fe4c34ca049ab05dea7c127c70430f39bb2

    • SHA256

      f777bf91481451dbf187752339995ebbb9352d87464982d65eda6ed54397f4af

    • SHA512

      fe21cb1d8cc97ec075bec3875fb9a4ddc48eef9fcae867c1c188922efb49defeb340266b1057effab0444c49f59a0e4a365c486be0bb7c9e97537b5d0cab36f6

    • SSDEEP

      24576:+yslZk4L+yfp1fs4pHNobPYML8TMHiFmc9:N94B1EQtoNHa

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks