General

  • Target

    Doge.exe

  • Size

    1021KB

  • Sample

    230519-x436saad4s

  • MD5

    2755ef8b6d8631ea86b218719860e29b

  • SHA1

    38e7bf4e848475b6c7542b01f29e2cd82ad6ae89

  • SHA256

    3e6479c74ad0c9615983f1fd6e51a6efeb566277e11065c6dfac24579fefd80c

  • SHA512

    c3c2ccfda0f0885bd0f37fc31021a164737978130254ac7e1a80590cd0cff300fee8de9a8309d2dfbdfb8d941ac92bd40bba5dcfb58cbd5f77bdc8bd1519d829

  • SSDEEP

    12288:+MrLy90j0CSp/Bhw1XsY2GUrLToxYFyRCD9qCM+jH1wVWB38iY+QQ2lod8HlY0Cy:VyBjg0G9+wCEIJ8ic1FqqIxSfj

Malware Config

Extracted

Family

redline

Botnet

luper

C2

77.91.68.253:19065

Attributes
  • auth_value

    474f8e2f629b7bc1a8c7ea1dc39ca043

Targets

    • Target

      Doge.exe

    • Size

      1021KB

    • MD5

      2755ef8b6d8631ea86b218719860e29b

    • SHA1

      38e7bf4e848475b6c7542b01f29e2cd82ad6ae89

    • SHA256

      3e6479c74ad0c9615983f1fd6e51a6efeb566277e11065c6dfac24579fefd80c

    • SHA512

      c3c2ccfda0f0885bd0f37fc31021a164737978130254ac7e1a80590cd0cff300fee8de9a8309d2dfbdfb8d941ac92bd40bba5dcfb58cbd5f77bdc8bd1519d829

    • SSDEEP

      12288:+MrLy90j0CSp/Bhw1XsY2GUrLToxYFyRCD9qCM+jH1wVWB38iY+QQ2lod8HlY0Cy:VyBjg0G9+wCEIJ8ic1FqqIxSfj

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks