General

  • Target

    6c6132d6bd11955de52d55ac3f75a885b3c4fdc25c1aba53c57ef3139cb99ac8

  • Size

    1.0MB

  • Sample

    230518-vnjq4adb37

  • MD5

    32f317b882962ee5b7a05f62b9849921

  • SHA1

    f81c12e87403b1e83ceebc6389c0d9c6f8266932

  • SHA256

    6c6132d6bd11955de52d55ac3f75a885b3c4fdc25c1aba53c57ef3139cb99ac8

  • SHA512

    678c7dc37300a714343a3abe5640f2904124f310df99482c3c2c206f007160edf23574f17812a0083299ecf972a6b0551d09988ab6d59d6a5502ce3fca3fe3e5

  • SSDEEP

    24576:oy+NpJJIeR9qN0jfNtafVJ5UU5oCwdlVTU:vyPJjR9qSDNtk35Utd

Malware Config

Extracted

Family

redline

Botnet

laxak

C2

77.91.68.253:41783

Attributes
  • auth_value

    9f2cf0f93f412b5c2e152400023c0fc3

Targets

    • Target

      6c6132d6bd11955de52d55ac3f75a885b3c4fdc25c1aba53c57ef3139cb99ac8

    • Size

      1.0MB

    • MD5

      32f317b882962ee5b7a05f62b9849921

    • SHA1

      f81c12e87403b1e83ceebc6389c0d9c6f8266932

    • SHA256

      6c6132d6bd11955de52d55ac3f75a885b3c4fdc25c1aba53c57ef3139cb99ac8

    • SHA512

      678c7dc37300a714343a3abe5640f2904124f310df99482c3c2c206f007160edf23574f17812a0083299ecf972a6b0551d09988ab6d59d6a5502ce3fca3fe3e5

    • SSDEEP

      24576:oy+NpJJIeR9qN0jfNtafVJ5UU5oCwdlVTU:vyPJjR9qSDNtk35Utd

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks