General

  • Target

    68067fe826034cf92fd2cd2ba92989dc7136ccf8c0108bc6e49b571ee8894b8d

  • Size

    1022KB

  • Sample

    230519-hh5edsfe76

  • MD5

    f2f449baf0fe2e6726609df2a4795185

  • SHA1

    58a5247b51a6407e619b07ce2b8905ecd9f3bd7b

  • SHA256

    68067fe826034cf92fd2cd2ba92989dc7136ccf8c0108bc6e49b571ee8894b8d

  • SHA512

    d62ba50ec4030e779726b7657258da19fbc7726231b586e6b60867f572e776ab3a3e498a48ada451edb5c2b91b78a4b8379584bb34bd787adef4eee93805c5fd

  • SSDEEP

    12288:QMr/y90zuFS+b0T9XsBcR5NrIJS6D7+RAuHXPxXGQLasUYLqXWse26Pxcm/wGfh7:/y0SSFTBf5NrIx0BP0CKycmI+Kw

Malware Config

Extracted

Family

redline

Botnet

lols

C2

77.91.68.253:41783

Attributes
  • auth_value

    07dccfc2986896754e6cde616a0a7868

Targets

    • Target

      68067fe826034cf92fd2cd2ba92989dc7136ccf8c0108bc6e49b571ee8894b8d

    • Size

      1022KB

    • MD5

      f2f449baf0fe2e6726609df2a4795185

    • SHA1

      58a5247b51a6407e619b07ce2b8905ecd9f3bd7b

    • SHA256

      68067fe826034cf92fd2cd2ba92989dc7136ccf8c0108bc6e49b571ee8894b8d

    • SHA512

      d62ba50ec4030e779726b7657258da19fbc7726231b586e6b60867f572e776ab3a3e498a48ada451edb5c2b91b78a4b8379584bb34bd787adef4eee93805c5fd

    • SSDEEP

      12288:QMr/y90zuFS+b0T9XsBcR5NrIJS6D7+RAuHXPxXGQLasUYLqXWse26Pxcm/wGfh7:/y0SSFTBf5NrIx0BP0CKycmI+Kw

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks