General

  • Target

    ee722f9872c329f01c7e20f9e6cf110fbc67c996b27ac38bc0c6b347894e7720

  • Size

    1.1MB

  • Sample

    230515-rh7zyseb7z

  • MD5

    552dba94208ac7f1390f4c55f88b0f57

  • SHA1

    7e11ccca99e4ff16146cf473ec5c9e3fda884d5a

  • SHA256

    ee722f9872c329f01c7e20f9e6cf110fbc67c996b27ac38bc0c6b347894e7720

  • SHA512

    0af0fefab0f96154c40028979203e1b786457353c877409278f2b048db1fb563d67a6845d1aad0b45b51c8e34edd4e072137ae80beff4d99b008f155cf56ec79

  • SSDEEP

    24576:Xy1BYG4oIgaMwG11NdCq0kU3wY+Cks8OPj4:i1Bj0MwG1/dz0kc+m8u

Malware Config

Extracted

Family

redline

Botnet

ment

C2

185.161.248.25:4132

Attributes
  • auth_value

    650f2fd9e43f18bed6e23c78d8cfb0af

Extracted

Family

redline

Botnet

naher

C2

185.161.248.25:4132

Attributes
  • auth_value

    91f06fcf80f600c56b2797e1c73d214d

Targets

    • Target

      ee722f9872c329f01c7e20f9e6cf110fbc67c996b27ac38bc0c6b347894e7720

    • Size

      1.1MB

    • MD5

      552dba94208ac7f1390f4c55f88b0f57

    • SHA1

      7e11ccca99e4ff16146cf473ec5c9e3fda884d5a

    • SHA256

      ee722f9872c329f01c7e20f9e6cf110fbc67c996b27ac38bc0c6b347894e7720

    • SHA512

      0af0fefab0f96154c40028979203e1b786457353c877409278f2b048db1fb563d67a6845d1aad0b45b51c8e34edd4e072137ae80beff4d99b008f155cf56ec79

    • SSDEEP

      24576:Xy1BYG4oIgaMwG11NdCq0kU3wY+Cks8OPj4:i1Bj0MwG1/dz0kc+m8u

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks