General

  • Target

    a1b6fcf24382d96d8a13bc8faabd810b118be5a09abf403a73741e9a2cedfa66

  • Size

    1.1MB

  • Sample

    230515-rmz5xaeb9x

  • MD5

    007a3ed4a512bb558ba1558b78797ac2

  • SHA1

    15ec3a4da30c07ddfea888da782cd740c3094a45

  • SHA256

    a1b6fcf24382d96d8a13bc8faabd810b118be5a09abf403a73741e9a2cedfa66

  • SHA512

    272e9c974ff17450e6c7c38223d2e57b86cbe76ed0c796c3c8ab9824f8e84da9a528d3ac5f49eeb7cf9ddc92f837dacd5c3b2a294ff70c46ab3aa3528655078d

  • SSDEEP

    24576:SyNWHRE0eAWUURTRyi2IvCCVW1aW/i0VLzstkZHKkCA+:5NWHO0e9UUREieR/dVctkV

Malware Config

Extracted

Family

redline

Botnet

ment

C2

185.161.248.25:4132

Attributes
  • auth_value

    650f2fd9e43f18bed6e23c78d8cfb0af

Extracted

Family

redline

Botnet

naher

C2

185.161.248.25:4132

Attributes
  • auth_value

    91f06fcf80f600c56b2797e1c73d214d

Targets

    • Target

      a1b6fcf24382d96d8a13bc8faabd810b118be5a09abf403a73741e9a2cedfa66

    • Size

      1.1MB

    • MD5

      007a3ed4a512bb558ba1558b78797ac2

    • SHA1

      15ec3a4da30c07ddfea888da782cd740c3094a45

    • SHA256

      a1b6fcf24382d96d8a13bc8faabd810b118be5a09abf403a73741e9a2cedfa66

    • SHA512

      272e9c974ff17450e6c7c38223d2e57b86cbe76ed0c796c3c8ab9824f8e84da9a528d3ac5f49eeb7cf9ddc92f837dacd5c3b2a294ff70c46ab3aa3528655078d

    • SSDEEP

      24576:SyNWHRE0eAWUURTRyi2IvCCVW1aW/i0VLzstkZHKkCA+:5NWHO0e9UUREieR/dVctkV

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks