General

  • Target

    4869f6f0ba12c52e449785aa3a101d5f.exe

  • Size

    1.0MB

  • Sample

    230520-g66rpadf3y

  • MD5

    4869f6f0ba12c52e449785aa3a101d5f

  • SHA1

    d15be212dade2ba72fa57b32dd005e5871ae55de

  • SHA256

    555ff9dbe4a2f2a50ab8f1778776c0b0566705935e1e1f90bed38e711d9326d5

  • SHA512

    aaa8b9875938cab5edcee532d248e503b93013869d8546d50fb04edf0835602a7093a51526bb2a1aea18f1c0936a20790f6907b5f41485e551d5eda95c6e5125

  • SSDEEP

    24576:eyDukKo+BkxumValU6vd0fYKF8BV8syBeTFgvHHP:tnEERValUjnF8BmTBe

Malware Config

Extracted

Family

redline

Botnet

deren

C2

77.91.68.253:19065

Attributes
  • auth_value

    04a169f1fb198bfbeca74d0e06ea2d54

Targets

    • Target

      4869f6f0ba12c52e449785aa3a101d5f.exe

    • Size

      1.0MB

    • MD5

      4869f6f0ba12c52e449785aa3a101d5f

    • SHA1

      d15be212dade2ba72fa57b32dd005e5871ae55de

    • SHA256

      555ff9dbe4a2f2a50ab8f1778776c0b0566705935e1e1f90bed38e711d9326d5

    • SHA512

      aaa8b9875938cab5edcee532d248e503b93013869d8546d50fb04edf0835602a7093a51526bb2a1aea18f1c0936a20790f6907b5f41485e551d5eda95c6e5125

    • SSDEEP

      24576:eyDukKo+BkxumValU6vd0fYKF8BV8syBeTFgvHHP:tnEERValUjnF8BmTBe

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks