General

  • Target

    a5c30e4857b8502ee35606e7ad31f27be20ec617c3a14ac0ef573559bd710b4e

  • Size

    1.0MB

  • Sample

    230519-kqvahach76

  • MD5

    694492f8a612706fa6ec0f927fd4c811

  • SHA1

    7bf66d10a8bd145b70d9469c4f9acf898930d32b

  • SHA256

    a5c30e4857b8502ee35606e7ad31f27be20ec617c3a14ac0ef573559bd710b4e

  • SHA512

    941e999f1e9e4a6d5d4d5787d2186ef702b8ea3ffb1feb9a34f123e05518a78791724095bb00a5a16d970f288441eee9714ed361d4b216580ccb576424d54043

  • SSDEEP

    24576:yyK3GeyTv0xZZnP7sZn+rDZ9OiBVM/94TqNO38Q:ZAGVvYnPGUDTfdqN

Malware Config

Extracted

Family

redline

Botnet

miser

C2

77.91.68.253:41783

Attributes
  • auth_value

    ac5366247122f5ac80ea790e0e73d5bc

Targets

    • Target

      a5c30e4857b8502ee35606e7ad31f27be20ec617c3a14ac0ef573559bd710b4e

    • Size

      1.0MB

    • MD5

      694492f8a612706fa6ec0f927fd4c811

    • SHA1

      7bf66d10a8bd145b70d9469c4f9acf898930d32b

    • SHA256

      a5c30e4857b8502ee35606e7ad31f27be20ec617c3a14ac0ef573559bd710b4e

    • SHA512

      941e999f1e9e4a6d5d4d5787d2186ef702b8ea3ffb1feb9a34f123e05518a78791724095bb00a5a16d970f288441eee9714ed361d4b216580ccb576424d54043

    • SSDEEP

      24576:yyK3GeyTv0xZZnP7sZn+rDZ9OiBVM/94TqNO38Q:ZAGVvYnPGUDTfdqN

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks