General

  • Target

    12497aaf8b60780593cbaf2ce31bc6af26dfb71879aa41ad91fc6a7de4863584

  • Size

    1.0MB

  • Sample

    230518-f2229sgg9z

  • MD5

    3492dd550adb3beb78e3d1bb84bb4bea

  • SHA1

    213b1f446870dcadf998084641f66dd3f3d6cd2d

  • SHA256

    12497aaf8b60780593cbaf2ce31bc6af26dfb71879aa41ad91fc6a7de4863584

  • SHA512

    4fdb353c560c4b6243c3bc72f4b91062e4c7a4799077c5f263aae57a1d7cf0a3e71492bbae99235f3e135643d50421621b3fe7fa53794c080f21c2b4ef57409a

  • SSDEEP

    24576:ryHX4n0Dwmhj+hQE7/YWfQvbWGnwZqv4QoPkpJrbDUUwG04ko:eHI0kmd9ETYW8bWGwkv4Rw9UUw7

Malware Config

Extracted

Family

redline

Botnet

dream

C2

77.91.68.253:4138

Attributes
  • auth_value

    7b4f26a4ca794e30cee1032d5cb62f5c

Targets

    • Target

      12497aaf8b60780593cbaf2ce31bc6af26dfb71879aa41ad91fc6a7de4863584

    • Size

      1.0MB

    • MD5

      3492dd550adb3beb78e3d1bb84bb4bea

    • SHA1

      213b1f446870dcadf998084641f66dd3f3d6cd2d

    • SHA256

      12497aaf8b60780593cbaf2ce31bc6af26dfb71879aa41ad91fc6a7de4863584

    • SHA512

      4fdb353c560c4b6243c3bc72f4b91062e4c7a4799077c5f263aae57a1d7cf0a3e71492bbae99235f3e135643d50421621b3fe7fa53794c080f21c2b4ef57409a

    • SSDEEP

      24576:ryHX4n0Dwmhj+hQE7/YWfQvbWGnwZqv4QoPkpJrbDUUwG04ko:eHI0kmd9ETYW8bWGwkv4Rw9UUw7

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks