General

  • Target

    b992d03f0e0ad90d95d1bc55abd0fa78433ed3980cce28ffb1437774d2a820a1

  • Size

    1.1MB

  • Sample

    230515-svzd1sgb65

  • MD5

    be21b020b99db86f88fb7667a0e5e2be

  • SHA1

    b0d2d0024b5ec2febbd869ad24a81a330729b248

  • SHA256

    b992d03f0e0ad90d95d1bc55abd0fa78433ed3980cce28ffb1437774d2a820a1

  • SHA512

    12c647530bd30c5c0de7156c7ead288520e84714167248ed04b7d80c05f1d1f24c2ba81b35da0a2226d944a6cb3a3872f164a7bd35494d1b67eb3c71ef35a2bd

  • SSDEEP

    24576:fyfGemi/XiER8EEo4ABwDYxWCKY9qUJEe:qj5EopwDYs

Malware Config

Extracted

Family

redline

Botnet

ment

C2

185.161.248.25:4132

Attributes
  • auth_value

    650f2fd9e43f18bed6e23c78d8cfb0af

Extracted

Family

redline

Botnet

naher

C2

185.161.248.25:4132

Attributes
  • auth_value

    91f06fcf80f600c56b2797e1c73d214d

Targets

    • Target

      b992d03f0e0ad90d95d1bc55abd0fa78433ed3980cce28ffb1437774d2a820a1

    • Size

      1.1MB

    • MD5

      be21b020b99db86f88fb7667a0e5e2be

    • SHA1

      b0d2d0024b5ec2febbd869ad24a81a330729b248

    • SHA256

      b992d03f0e0ad90d95d1bc55abd0fa78433ed3980cce28ffb1437774d2a820a1

    • SHA512

      12c647530bd30c5c0de7156c7ead288520e84714167248ed04b7d80c05f1d1f24c2ba81b35da0a2226d944a6cb3a3872f164a7bd35494d1b67eb3c71ef35a2bd

    • SSDEEP

      24576:fyfGemi/XiER8EEo4ABwDYxWCKY9qUJEe:qj5EopwDYs

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks