General

  • Target

    e85074b054cd62c36275eb9458bcf7864ed39be5adad91ae0a54e61386ae689f

  • Size

    1.0MB

  • Sample

    230520-hpy6ysba57

  • MD5

    dc7ca07b88c5d05c340717bd28400dcf

  • SHA1

    f625ef3f8c1eecf24dac95b70b4a2e590b404376

  • SHA256

    e85074b054cd62c36275eb9458bcf7864ed39be5adad91ae0a54e61386ae689f

  • SHA512

    9e4837b4ecde6db2d4276fb5087d6b78e032e81ff41c8f804478b2fd3fdd976fb2e85b68f90ea4a50e4b4f0a2527de72df3a4267ff032a1fcd5b60b9fe552f03

  • SSDEEP

    24576:SyXfs879l6688meMoKPeq3sk/Sd0fZfK2NXa7:5XflH3+eDX90JfX

Malware Config

Extracted

Family

redline

Botnet

meren

C2

77.91.68.253:19065

Attributes
  • auth_value

    a26557b435e44b55fdd4708fbba97d21

Targets

    • Target

      e85074b054cd62c36275eb9458bcf7864ed39be5adad91ae0a54e61386ae689f

    • Size

      1.0MB

    • MD5

      dc7ca07b88c5d05c340717bd28400dcf

    • SHA1

      f625ef3f8c1eecf24dac95b70b4a2e590b404376

    • SHA256

      e85074b054cd62c36275eb9458bcf7864ed39be5adad91ae0a54e61386ae689f

    • SHA512

      9e4837b4ecde6db2d4276fb5087d6b78e032e81ff41c8f804478b2fd3fdd976fb2e85b68f90ea4a50e4b4f0a2527de72df3a4267ff032a1fcd5b60b9fe552f03

    • SSDEEP

      24576:SyXfs879l6688meMoKPeq3sk/Sd0fZfK2NXa7:5XflH3+eDX90JfX

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks