General

  • Target

    b8e30932b420011082a4d41a9659a350a1a058a511916c4376ed848040a8f194

  • Size

    1019KB

  • Sample

    230519-b57dyadd3w

  • MD5

    c8028db09e8dbc065f1d7573f9b1c3fb

  • SHA1

    0d2ec212b2a0514f00a3b57ea62de71e4d92e4b2

  • SHA256

    b8e30932b420011082a4d41a9659a350a1a058a511916c4376ed848040a8f194

  • SHA512

    7a1139a3d74c3b3af1faac8a66cd22b7f34f4b00350872490b9823970312592343114ccb054526bbb44209d62128f1e245a4266521d8dee4a832ac747678e0fb

  • SSDEEP

    24576:jyAJhZXbm4G9Z7i9gEQsiDJtdYqq635YlnWKSTacKKJYTyYMy:2WhZXbo9Z+9g6EO56pN1KKJYW

Malware Config

Extracted

Family

redline

Botnet

lols

C2

77.91.68.253:41783

Attributes
  • auth_value

    07dccfc2986896754e6cde616a0a7868

Targets

    • Target

      b8e30932b420011082a4d41a9659a350a1a058a511916c4376ed848040a8f194

    • Size

      1019KB

    • MD5

      c8028db09e8dbc065f1d7573f9b1c3fb

    • SHA1

      0d2ec212b2a0514f00a3b57ea62de71e4d92e4b2

    • SHA256

      b8e30932b420011082a4d41a9659a350a1a058a511916c4376ed848040a8f194

    • SHA512

      7a1139a3d74c3b3af1faac8a66cd22b7f34f4b00350872490b9823970312592343114ccb054526bbb44209d62128f1e245a4266521d8dee4a832ac747678e0fb

    • SSDEEP

      24576:jyAJhZXbm4G9Z7i9gEQsiDJtdYqq635YlnWKSTacKKJYTyYMy:2WhZXbo9Z+9g6EO56pN1KKJYW

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks