General

  • Target

    81395bcae87f4184640dc7d702a524f3.exe

  • Size

    1020KB

  • Sample

    230518-wmew7acb81

  • MD5

    81395bcae87f4184640dc7d702a524f3

  • SHA1

    0294a00c2a5dd8429604a6f3b7a6dbda0cc400e2

  • SHA256

    eeae25c314c452a030203eee19215af179e341743138117de96b2b8cefd57fbe

  • SHA512

    fc2aa4c4096b1baad9c263d9b377f2d1f13e17df02d4eddc856b50c3fce7e33dc72b3a50c8e50b7142c83dbc456b788171b340f6a859581674693af43dac5018

  • SSDEEP

    24576:ZyyZfgKbETZkyOEGVMFzQ+O3n1lPjkgAYd3:MyZd1yOE6MBQ+cXPjkgAYd

Malware Config

Extracted

Family

redline

Botnet

laxak

C2

77.91.68.253:41783

Attributes
  • auth_value

    9f2cf0f93f412b5c2e152400023c0fc3

Targets

    • Target

      81395bcae87f4184640dc7d702a524f3.exe

    • Size

      1020KB

    • MD5

      81395bcae87f4184640dc7d702a524f3

    • SHA1

      0294a00c2a5dd8429604a6f3b7a6dbda0cc400e2

    • SHA256

      eeae25c314c452a030203eee19215af179e341743138117de96b2b8cefd57fbe

    • SHA512

      fc2aa4c4096b1baad9c263d9b377f2d1f13e17df02d4eddc856b50c3fce7e33dc72b3a50c8e50b7142c83dbc456b788171b340f6a859581674693af43dac5018

    • SSDEEP

      24576:ZyyZfgKbETZkyOEGVMFzQ+O3n1lPjkgAYd3:MyZd1yOE6MBQ+cXPjkgAYd

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks