General

  • Target

    0c892f5fa2744422222665b88c8f2a31f5155bcc2b176ec97e2c708434bdeace

  • Size

    1.1MB

  • Sample

    230515-ty18fsgc86

  • MD5

    3203effd99a9161a8fb1bded70d13dc6

  • SHA1

    04b3e1867b13fbaa08d4802c996801370ec7e79f

  • SHA256

    0c892f5fa2744422222665b88c8f2a31f5155bcc2b176ec97e2c708434bdeace

  • SHA512

    de261e49eaadf689f1a5dab8628a1d1d846d083f7bdfa026d4a491ab041e5130452d67aafe3f5ce76cdf86c4abd823e8c3ed96761ee3151fef96c0e0a0546522

  • SSDEEP

    24576:QyfwssfWjPinIAuUAbI69ABh49rGOAbXQBL3Rf0O6hZr:X4ojSfsI6emCTbXYLhfQf

Malware Config

Extracted

Family

redline

Botnet

ment

C2

185.161.248.25:4132

Attributes
  • auth_value

    650f2fd9e43f18bed6e23c78d8cfb0af

Extracted

Family

redline

Botnet

naher

C2

185.161.248.25:4132

Attributes
  • auth_value

    91f06fcf80f600c56b2797e1c73d214d

Targets

    • Target

      0c892f5fa2744422222665b88c8f2a31f5155bcc2b176ec97e2c708434bdeace

    • Size

      1.1MB

    • MD5

      3203effd99a9161a8fb1bded70d13dc6

    • SHA1

      04b3e1867b13fbaa08d4802c996801370ec7e79f

    • SHA256

      0c892f5fa2744422222665b88c8f2a31f5155bcc2b176ec97e2c708434bdeace

    • SHA512

      de261e49eaadf689f1a5dab8628a1d1d846d083f7bdfa026d4a491ab041e5130452d67aafe3f5ce76cdf86c4abd823e8c3ed96761ee3151fef96c0e0a0546522

    • SSDEEP

      24576:QyfwssfWjPinIAuUAbI69ABh49rGOAbXQBL3Rf0O6hZr:X4ojSfsI6emCTbXYLhfQf

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks