General

  • Target

    d42d534d606fd396dc770d2d522707d06523b5aaeabde2910fcf9256af99c18e

  • Size

    1.0MB

  • Sample

    230518-n4kj1ahf3x

  • MD5

    885cb2ef3d53a62546a6619665807ea8

  • SHA1

    a4cdc49349de36e40c1f17f1ee862941fe4dbff6

  • SHA256

    d42d534d606fd396dc770d2d522707d06523b5aaeabde2910fcf9256af99c18e

  • SHA512

    2052a059ae3f879a3a57efd551e37d4af01209a66b17437105708a662dfda06c861099d9bdca38c409897a6564d327bb992efcfe5e8330b0cdf6d24511e2cd72

  • SSDEEP

    24576:oy8QaV3QzUOSAGnEFSmFXINKfExOdukIF6NdG5T3ASTXZD:v80/NnIiFEQ3y6N8l3Z

Malware Config

Extracted

Family

redline

Botnet

luna

C2

77.91.68.253:4138

Attributes
  • auth_value

    16dec8addb01db1c11c59667022ef7a2

Targets

    • Target

      d42d534d606fd396dc770d2d522707d06523b5aaeabde2910fcf9256af99c18e

    • Size

      1.0MB

    • MD5

      885cb2ef3d53a62546a6619665807ea8

    • SHA1

      a4cdc49349de36e40c1f17f1ee862941fe4dbff6

    • SHA256

      d42d534d606fd396dc770d2d522707d06523b5aaeabde2910fcf9256af99c18e

    • SHA512

      2052a059ae3f879a3a57efd551e37d4af01209a66b17437105708a662dfda06c861099d9bdca38c409897a6564d327bb992efcfe5e8330b0cdf6d24511e2cd72

    • SSDEEP

      24576:oy8QaV3QzUOSAGnEFSmFXINKfExOdukIF6NdG5T3ASTXZD:v80/NnIiFEQ3y6N8l3Z

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks