General

  • Target

    489fb0b6350ef30f8f3d97ae87ca9e7707eebb62422982c4585bd975183dad28

  • Size

    1.0MB

  • Sample

    230519-ay768adb7z

  • MD5

    ca8263b7f31da872fddb20e30c51a893

  • SHA1

    79ef3c4ba91f2ae08b545c3b85246dd463aa1308

  • SHA256

    489fb0b6350ef30f8f3d97ae87ca9e7707eebb62422982c4585bd975183dad28

  • SHA512

    bda679875f4b25c591c55dd849ed6165395dae2b27855df92b05e2bab47d8ca44d2baaf67f4c763b6eecd964f4950d01f40453a76bd55451434a1a3e5d6d04f4

  • SSDEEP

    24576:Ny3iFkoLm4oh1Awt5rmvSo+aEgfsR9nH4T+:o30/5s19HrmvSCEi+1Y

Malware Config

Extracted

Family

redline

Botnet

dolz

C2

77.91.68.253:41783

Attributes
  • auth_value

    91a052e7685b96dcfc2defe95d9affb8

Targets

    • Target

      489fb0b6350ef30f8f3d97ae87ca9e7707eebb62422982c4585bd975183dad28

    • Size

      1.0MB

    • MD5

      ca8263b7f31da872fddb20e30c51a893

    • SHA1

      79ef3c4ba91f2ae08b545c3b85246dd463aa1308

    • SHA256

      489fb0b6350ef30f8f3d97ae87ca9e7707eebb62422982c4585bd975183dad28

    • SHA512

      bda679875f4b25c591c55dd849ed6165395dae2b27855df92b05e2bab47d8ca44d2baaf67f4c763b6eecd964f4950d01f40453a76bd55451434a1a3e5d6d04f4

    • SSDEEP

      24576:Ny3iFkoLm4oh1Awt5rmvSo+aEgfsR9nH4T+:o30/5s19HrmvSCEi+1Y

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks