General

  • Target

    433424993f3334a0579b839f41b2b0bc191e3903ce4859f4eb4d795c0d807297

  • Size

    1.1MB

  • Sample

    230515-s2wlpsef3s

  • MD5

    f71a3a39453181032324110800c27c36

  • SHA1

    f16dd585fdabf41adcc5147c052f47f5cdcff9ab

  • SHA256

    433424993f3334a0579b839f41b2b0bc191e3903ce4859f4eb4d795c0d807297

  • SHA512

    aaef36484b9095ba875a6cf8e931d71c4acece85456c86bdc1f80c8ed5c7300923572de9de534b0345b8322a18f36cc4de0bb98154d5cba889c43c795f42e6bb

  • SSDEEP

    24576:fyUCUrux/lBUeFXh27h3PkZND6qlhfEhdJ4MdsI:qrU6ZlBUCpDthcdJVd

Malware Config

Extracted

Family

redline

Botnet

ment

C2

185.161.248.25:4132

Attributes
  • auth_value

    650f2fd9e43f18bed6e23c78d8cfb0af

Extracted

Family

redline

Botnet

naher

C2

185.161.248.25:4132

Attributes
  • auth_value

    91f06fcf80f600c56b2797e1c73d214d

Targets

    • Target

      433424993f3334a0579b839f41b2b0bc191e3903ce4859f4eb4d795c0d807297

    • Size

      1.1MB

    • MD5

      f71a3a39453181032324110800c27c36

    • SHA1

      f16dd585fdabf41adcc5147c052f47f5cdcff9ab

    • SHA256

      433424993f3334a0579b839f41b2b0bc191e3903ce4859f4eb4d795c0d807297

    • SHA512

      aaef36484b9095ba875a6cf8e931d71c4acece85456c86bdc1f80c8ed5c7300923572de9de534b0345b8322a18f36cc4de0bb98154d5cba889c43c795f42e6bb

    • SSDEEP

      24576:fyUCUrux/lBUeFXh27h3PkZND6qlhfEhdJ4MdsI:qrU6ZlBUCpDthcdJVd

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks