General

  • Target

    7b42329d4b7ea8cebf9ef0abab182861cd627131c2e26f2db0e184e2ce542c36

  • Size

    1.1MB

  • Sample

    230516-qhjfxsah73

  • MD5

    c374f277b748b78588c921b8885a9049

  • SHA1

    d3ec8b5b78c5be4958dc2540844e00267e91143a

  • SHA256

    7b42329d4b7ea8cebf9ef0abab182861cd627131c2e26f2db0e184e2ce542c36

  • SHA512

    4dfbf0548ff050a291539737420da100d5d97a5106882372a8531d661ad7dfb299193640eb94a1718806435270ed7f241e969cfcd048b325dd366fada55d05a4

  • SSDEEP

    24576:6y7p1ZfdhUgnlYU/+zEqJ1VLhcG7MGpi322kBGrpYXmFh:B1lYaWvQ22oMpY2

Malware Config

Extracted

Family

redline

Botnet

dopon

C2

185.161.248.75:4132

Attributes
  • auth_value

    8b75ad7ee23fb4d414b2c7174486600e

Extracted

Family

redline

Botnet

srala

C2

185.161.248.75:4132

Attributes
  • auth_value

    c90de493c232a904fb467fa366785cb6

Targets

    • Target

      7b42329d4b7ea8cebf9ef0abab182861cd627131c2e26f2db0e184e2ce542c36

    • Size

      1.1MB

    • MD5

      c374f277b748b78588c921b8885a9049

    • SHA1

      d3ec8b5b78c5be4958dc2540844e00267e91143a

    • SHA256

      7b42329d4b7ea8cebf9ef0abab182861cd627131c2e26f2db0e184e2ce542c36

    • SHA512

      4dfbf0548ff050a291539737420da100d5d97a5106882372a8531d661ad7dfb299193640eb94a1718806435270ed7f241e969cfcd048b325dd366fada55d05a4

    • SSDEEP

      24576:6y7p1ZfdhUgnlYU/+zEqJ1VLhcG7MGpi322kBGrpYXmFh:B1lYaWvQ22oMpY2

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks