General

  • Target

    eb539596aee784956a04dcf2055272b8eeb0dec4089c324a4a91d10585417a62

  • Size

    1.0MB

  • Sample

    230520-e7lrssae44

  • MD5

    a237127ec5459f47b3587be010b25237

  • SHA1

    4fc69196aedcf87803fcf94645522f7e14383b22

  • SHA256

    eb539596aee784956a04dcf2055272b8eeb0dec4089c324a4a91d10585417a62

  • SHA512

    076aa8a1b53351d325cedf8db86730ec983afdbcec513105dadbcbbeb580f3d93d2aab03f8ef04337a645f2003d9c9e557491b06ce317d4d7e84b7bb4e424105

  • SSDEEP

    24576:myvR0QFbsm/HCemX9ctV5GLg+5KVu9n+JVpNza:1JFFYtYV65ku9+7

Malware Config

Extracted

Family

redline

Botnet

leren

C2

77.91.68.253:19065

Attributes
  • auth_value

    4002956b5a03c59e4252363b86bc7713

Targets

    • Target

      eb539596aee784956a04dcf2055272b8eeb0dec4089c324a4a91d10585417a62

    • Size

      1.0MB

    • MD5

      a237127ec5459f47b3587be010b25237

    • SHA1

      4fc69196aedcf87803fcf94645522f7e14383b22

    • SHA256

      eb539596aee784956a04dcf2055272b8eeb0dec4089c324a4a91d10585417a62

    • SHA512

      076aa8a1b53351d325cedf8db86730ec983afdbcec513105dadbcbbeb580f3d93d2aab03f8ef04337a645f2003d9c9e557491b06ce317d4d7e84b7bb4e424105

    • SSDEEP

      24576:myvR0QFbsm/HCemX9ctV5GLg+5KVu9n+JVpNza:1JFFYtYV65ku9+7

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks