General

  • Target

    820aa2d8278af28e5533ea9842ce2a78419a864878a0fc48e2c9eaf9b43b6cdf

  • Size

    1.0MB

  • Sample

    230520-rhz94scf82

  • MD5

    74cf4e669132502821d674b556bdd033

  • SHA1

    4973bdb9335fd4f63f9caca3beb595c280e7f96d

  • SHA256

    820aa2d8278af28e5533ea9842ce2a78419a864878a0fc48e2c9eaf9b43b6cdf

  • SHA512

    9a7be627f6c5861d050cca42b9fdb1e2b51fd3b597db1395e3d7fa912171128cbf6fda2a372e12e77a1478bb0ee05a5132f76d2e088147b98a11a3bb5ba8afa5

  • SSDEEP

    24576:Zy1HF9uoiF13jMBhKhX7cYxzopap9uHIAg0meQp:M1HFHiX8kNQYxzXP0

Malware Config

Extracted

Family

redline

Botnet

deren

C2

77.91.68.253:19065

Attributes
  • auth_value

    04a169f1fb198bfbeca74d0e06ea2d54

Targets

    • Target

      820aa2d8278af28e5533ea9842ce2a78419a864878a0fc48e2c9eaf9b43b6cdf

    • Size

      1.0MB

    • MD5

      74cf4e669132502821d674b556bdd033

    • SHA1

      4973bdb9335fd4f63f9caca3beb595c280e7f96d

    • SHA256

      820aa2d8278af28e5533ea9842ce2a78419a864878a0fc48e2c9eaf9b43b6cdf

    • SHA512

      9a7be627f6c5861d050cca42b9fdb1e2b51fd3b597db1395e3d7fa912171128cbf6fda2a372e12e77a1478bb0ee05a5132f76d2e088147b98a11a3bb5ba8afa5

    • SSDEEP

      24576:Zy1HF9uoiF13jMBhKhX7cYxzopap9uHIAg0meQp:M1HFHiX8kNQYxzXP0

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks