General

  • Target

    0059c409933a30b2b41a00bdc55397797c2c4b167d4594cfff79a1e0b194fc27

  • Size

    1.1MB

  • Sample

    230515-y4f7pafg2s

  • MD5

    9cdaaffa7f8ea72e761ceeaa3072a022

  • SHA1

    d1546ad3bd49b9a7d3613df970c1aca1978a5ea4

  • SHA256

    0059c409933a30b2b41a00bdc55397797c2c4b167d4594cfff79a1e0b194fc27

  • SHA512

    6894307f4dddbe59f1d312950757727355abeec73a1eadf38b3170083756849f902ec70e48f17c6b9d811e3fa6831e78904bdb159e47464b164a7fd6dde1f6fb

  • SSDEEP

    24576:9yUIcfkAqG8xaD7lyGkmDu8+0jtivYp/2nps85Nou2qYYL:YrUqG8+7Tw8+0UvE0s8gs

Malware Config

Extracted

Family

redline

Botnet

dama

C2

185.161.248.25:4132

Attributes
  • auth_value

    d8b2637e0546aea3944c251022b63e77

Extracted

Family

redline

Botnet

sister

C2

185.161.248.25:4132

Attributes
  • auth_value

    61021810f83e6d5e6ff303aaac03c0e1

Targets

    • Target

      0059c409933a30b2b41a00bdc55397797c2c4b167d4594cfff79a1e0b194fc27

    • Size

      1.1MB

    • MD5

      9cdaaffa7f8ea72e761ceeaa3072a022

    • SHA1

      d1546ad3bd49b9a7d3613df970c1aca1978a5ea4

    • SHA256

      0059c409933a30b2b41a00bdc55397797c2c4b167d4594cfff79a1e0b194fc27

    • SHA512

      6894307f4dddbe59f1d312950757727355abeec73a1eadf38b3170083756849f902ec70e48f17c6b9d811e3fa6831e78904bdb159e47464b164a7fd6dde1f6fb

    • SSDEEP

      24576:9yUIcfkAqG8xaD7lyGkmDu8+0jtivYp/2nps85Nou2qYYL:YrUqG8+7Tw8+0UvE0s8gs

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks