General

  • Target

    f86399c5f44c45da42b78663731c1a04777e9755e142ce149a5489dbddf6b2e6

  • Size

    1.1MB

  • Sample

    230515-vf6wnafa4w

  • MD5

    11ffc425aa7ffad9b31bf6103d0ff2d5

  • SHA1

    0327fe93183eca081fc02981e483ae94976c14c8

  • SHA256

    f86399c5f44c45da42b78663731c1a04777e9755e142ce149a5489dbddf6b2e6

  • SHA512

    bdfca134b386badc60bac5807d268ff80a170e23bc6f57c25d61ea85c3326b43d88bbbd9f4883bd7bd5eb1b7e6eade65dbff6ece2d4dd62aa9a6ed0b89a4b840

  • SSDEEP

    24576:pys3QoQfcPtfFnowywmUgxRyWEUmOyrmW:c7stdnolwmBRyWFW

Malware Config

Extracted

Family

redline

Botnet

laris

C2

185.161.248.25:4132

Attributes
  • auth_value

    8774964465c41ab67a0a17432b084e1e

Extracted

Family

redline

Botnet

naher

C2

185.161.248.25:4132

Attributes
  • auth_value

    91f06fcf80f600c56b2797e1c73d214d

Targets

    • Target

      f86399c5f44c45da42b78663731c1a04777e9755e142ce149a5489dbddf6b2e6

    • Size

      1.1MB

    • MD5

      11ffc425aa7ffad9b31bf6103d0ff2d5

    • SHA1

      0327fe93183eca081fc02981e483ae94976c14c8

    • SHA256

      f86399c5f44c45da42b78663731c1a04777e9755e142ce149a5489dbddf6b2e6

    • SHA512

      bdfca134b386badc60bac5807d268ff80a170e23bc6f57c25d61ea85c3326b43d88bbbd9f4883bd7bd5eb1b7e6eade65dbff6ece2d4dd62aa9a6ed0b89a4b840

    • SSDEEP

      24576:pys3QoQfcPtfFnowywmUgxRyWEUmOyrmW:c7stdnolwmBRyWFW

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks