General

  • Target

    3ecac06730138d8a3eb98823306cefaf31e8846e8bbf06b0bd6009647931a588

  • Size

    1.0MB

  • Sample

    230519-1ekvpabb41

  • MD5

    926ec1f0b46b16c29bef685e50807063

  • SHA1

    2d61bcc795a95004a0b32711bfa5ab2cd434bf09

  • SHA256

    3ecac06730138d8a3eb98823306cefaf31e8846e8bbf06b0bd6009647931a588

  • SHA512

    2953e5ff1d5ca539c2a1042e1589af6043c8640bc7a2d3061829721ca20eda0e9ff98debbd56d7c0bff7af378a71f30b072fbadf38068c76283a4043eb4510aa

  • SSDEEP

    24576:Gyeysq2vc48dk7H/N8qP2NrMY8tyTTL9b:Veoa7Hlyt8UT1

Malware Config

Extracted

Family

redline

Botnet

duper

C2

77.91.68.253:19065

Attributes
  • auth_value

    57e17ebbdb18f4882b95fe05402ef1c8

Targets

    • Target

      3ecac06730138d8a3eb98823306cefaf31e8846e8bbf06b0bd6009647931a588

    • Size

      1.0MB

    • MD5

      926ec1f0b46b16c29bef685e50807063

    • SHA1

      2d61bcc795a95004a0b32711bfa5ab2cd434bf09

    • SHA256

      3ecac06730138d8a3eb98823306cefaf31e8846e8bbf06b0bd6009647931a588

    • SHA512

      2953e5ff1d5ca539c2a1042e1589af6043c8640bc7a2d3061829721ca20eda0e9ff98debbd56d7c0bff7af378a71f30b072fbadf38068c76283a4043eb4510aa

    • SSDEEP

      24576:Gyeysq2vc48dk7H/N8qP2NrMY8tyTTL9b:Veoa7Hlyt8UT1

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks