General

  • Target

    f9d478e7546a164f1d4ecc8456c6b53eae01ae5afa75a7f4010c025562d8f7cb

  • Size

    1.1MB

  • Sample

    230516-l5p5rscc73

  • MD5

    22dc055e36e6d120f89ff8b267484326

  • SHA1

    4cdc091458a72978296b7af83e15a8e5bf01a82e

  • SHA256

    f9d478e7546a164f1d4ecc8456c6b53eae01ae5afa75a7f4010c025562d8f7cb

  • SHA512

    8cd16207fc977590f9631a1ad7f8c00f365cb1d67df2be36defaeab5bbbc8559010d8f6860e10564e7f445426574ea997607fd5cd4bb8f72ef3c231e989259ab

  • SSDEEP

    24576:ayfjedBBtSsH329JTt3UMsmhUYPloBTO5tkLbUH2WQ7Y06ZHKX3zV4:hfeFHIJTt3UZmhUgkfE2WihkqH

Malware Config

Extracted

Family

redline

Botnet

dopon

C2

185.161.248.75:4132

Attributes
  • auth_value

    8b75ad7ee23fb4d414b2c7174486600e

Extracted

Family

redline

Botnet

srala

C2

185.161.248.75:4132

Attributes
  • auth_value

    c90de493c232a904fb467fa366785cb6

Targets

    • Target

      f9d478e7546a164f1d4ecc8456c6b53eae01ae5afa75a7f4010c025562d8f7cb

    • Size

      1.1MB

    • MD5

      22dc055e36e6d120f89ff8b267484326

    • SHA1

      4cdc091458a72978296b7af83e15a8e5bf01a82e

    • SHA256

      f9d478e7546a164f1d4ecc8456c6b53eae01ae5afa75a7f4010c025562d8f7cb

    • SHA512

      8cd16207fc977590f9631a1ad7f8c00f365cb1d67df2be36defaeab5bbbc8559010d8f6860e10564e7f445426574ea997607fd5cd4bb8f72ef3c231e989259ab

    • SSDEEP

      24576:ayfjedBBtSsH329JTt3UMsmhUYPloBTO5tkLbUH2WQ7Y06ZHKX3zV4:hfeFHIJTt3UZmhUgkfE2WihkqH

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.