General

  • Target

    d7a348018704c681a5b706313440d081.exe

  • Size

    1021KB

  • Sample

    230520-1d86wshd61

  • MD5

    d7a348018704c681a5b706313440d081

  • SHA1

    21d53b237d9cac972ae8b9ccfe8454e4d77b3902

  • SHA256

    141be433bcb78f4b0460c5f4f1e133d08f236ab8a5ecd0b047ef2b6f85d50173

  • SHA512

    9788f34acc743187434cab8a3bd2576a704a4f270eed3fe15687c57f3eef14b1512777e88423bd8ca9ac11a26b18ade344661dee2547c41ee62f8fba283dce82

  • SSDEEP

    24576:UyXdEq3Tj7BvjqfA2008oEFUk19dJxvbivhfLw38c33NUE:jXx3Tj7RjqR00j+d19r4ZDw3da

Malware Config

Extracted

Family

redline

Botnet

laza

C2

77.91.124.251:19065

Attributes
  • auth_value

    c5e3b769b3929b25aad5a26e2354ccb9

Targets

    • Target

      d7a348018704c681a5b706313440d081.exe

    • Size

      1021KB

    • MD5

      d7a348018704c681a5b706313440d081

    • SHA1

      21d53b237d9cac972ae8b9ccfe8454e4d77b3902

    • SHA256

      141be433bcb78f4b0460c5f4f1e133d08f236ab8a5ecd0b047ef2b6f85d50173

    • SHA512

      9788f34acc743187434cab8a3bd2576a704a4f270eed3fe15687c57f3eef14b1512777e88423bd8ca9ac11a26b18ade344661dee2547c41ee62f8fba283dce82

    • SSDEEP

      24576:UyXdEq3Tj7BvjqfA2008oEFUk19dJxvbivhfLw38c33NUE:jXx3Tj7RjqR00j+d19r4ZDw3da

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks