General

  • Target

    205531f46aef444dfb40b67a767f573fd5353a38be04f10e6dd071852b99e6e5

  • Size

    1.0MB

  • Sample

    230519-bjcbnsed43

  • MD5

    38621716539a7cd4804e75efb3113530

  • SHA1

    f6c713ec034eba618b377c219bccc18afc5e5ed1

  • SHA256

    205531f46aef444dfb40b67a767f573fd5353a38be04f10e6dd071852b99e6e5

  • SHA512

    f803047788a956d7fdbea1cd9ab0ee653f17880dc94a5a003bf208da7740c2e01b8e057fe01816c0adb16e693b5f29e2bc99c671704b4462050d73f5a3e58ed4

  • SSDEEP

    24576:pyUSzqjtxH1SN4+hGAagt0NiCEaApBQq9jO0Y:cUS+3H1vSGot0NIaA9

Malware Config

Extracted

Family

redline

Botnet

dolz

C2

77.91.68.253:41783

Attributes
  • auth_value

    91a052e7685b96dcfc2defe95d9affb8

Targets

    • Target

      205531f46aef444dfb40b67a767f573fd5353a38be04f10e6dd071852b99e6e5

    • Size

      1.0MB

    • MD5

      38621716539a7cd4804e75efb3113530

    • SHA1

      f6c713ec034eba618b377c219bccc18afc5e5ed1

    • SHA256

      205531f46aef444dfb40b67a767f573fd5353a38be04f10e6dd071852b99e6e5

    • SHA512

      f803047788a956d7fdbea1cd9ab0ee653f17880dc94a5a003bf208da7740c2e01b8e057fe01816c0adb16e693b5f29e2bc99c671704b4462050d73f5a3e58ed4

    • SSDEEP

      24576:pyUSzqjtxH1SN4+hGAagt0NiCEaApBQq9jO0Y:cUS+3H1vSGot0NIaA9

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks