General

  • Target

    20bf9246323f40b335b1dabbdbc10ab789dfcbc5d0dd6e2550be6341a702367d

  • Size

    1.0MB

  • Sample

    230520-1d5tgaeg84

  • MD5

    7e7c189e9a0473c963f15218fcd0b07e

  • SHA1

    0c18f762fc71130d105146068e6d97bbb41a1c38

  • SHA256

    20bf9246323f40b335b1dabbdbc10ab789dfcbc5d0dd6e2550be6341a702367d

  • SHA512

    c8a802dab34734c32e39ec106280d041a85488bc41ee312aae0c5a06fe425b2d104a739a97c08b798799a553f15ab8c5b3fa1e8b244967375f329ede40f17700

  • SSDEEP

    12288:6Mrpy908TG+EO/NAWk8aep1ItutKMzNZ3ft4K0b8XJGcS4/73VicTOiP925a5ee1:bydTtH/N3a6gutVzVlzpT2yJVkjo

Malware Config

Extracted

Family

redline

Botnet

daza

C2

77.91.124.251:19065

Attributes
  • auth_value

    0bd5963efefdd6409185423d5ca3439c

Targets

    • Target

      20bf9246323f40b335b1dabbdbc10ab789dfcbc5d0dd6e2550be6341a702367d

    • Size

      1.0MB

    • MD5

      7e7c189e9a0473c963f15218fcd0b07e

    • SHA1

      0c18f762fc71130d105146068e6d97bbb41a1c38

    • SHA256

      20bf9246323f40b335b1dabbdbc10ab789dfcbc5d0dd6e2550be6341a702367d

    • SHA512

      c8a802dab34734c32e39ec106280d041a85488bc41ee312aae0c5a06fe425b2d104a739a97c08b798799a553f15ab8c5b3fa1e8b244967375f329ede40f17700

    • SSDEEP

      12288:6Mrpy908TG+EO/NAWk8aep1ItutKMzNZ3ft4K0b8XJGcS4/73VicTOiP925a5ee1:bydTtH/N3a6gutVzVlzpT2yJVkjo

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks