General

  • Target

    c561c4ba4360c9807492aa05e5a9218b44cb48488ce5a6222f295183dc611477

  • Size

    1021KB

  • Sample

    230519-brc8yadc61

  • MD5

    5c9109cb10e0d627aa7de4dd548ee992

  • SHA1

    906545070b4228fba90971c4845a3b7ed892f6ea

  • SHA256

    c561c4ba4360c9807492aa05e5a9218b44cb48488ce5a6222f295183dc611477

  • SHA512

    65a3135271c1c4f9493bb2e904003d40b812730c3a23211db245c4cc932b6cc0a5a5b8edfae4124d011f326651a8dbb2082291d2538192bde33368ca1007513a

  • SSDEEP

    24576:2yPptE1LJiQNeubmfSAw1heWanJuViv5r21DhxDWYf/:FPpt4LJPNeugw1he7Jukr21dx5f

Malware Config

Extracted

Family

redline

Botnet

lols

C2

77.91.68.253:41783

Attributes
  • auth_value

    07dccfc2986896754e6cde616a0a7868

Targets

    • Target

      c561c4ba4360c9807492aa05e5a9218b44cb48488ce5a6222f295183dc611477

    • Size

      1021KB

    • MD5

      5c9109cb10e0d627aa7de4dd548ee992

    • SHA1

      906545070b4228fba90971c4845a3b7ed892f6ea

    • SHA256

      c561c4ba4360c9807492aa05e5a9218b44cb48488ce5a6222f295183dc611477

    • SHA512

      65a3135271c1c4f9493bb2e904003d40b812730c3a23211db245c4cc932b6cc0a5a5b8edfae4124d011f326651a8dbb2082291d2538192bde33368ca1007513a

    • SSDEEP

      24576:2yPptE1LJiQNeubmfSAw1heWanJuViv5r21DhxDWYf/:FPpt4LJPNeugw1he7Jukr21dx5f

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks