General

  • Target

    fcab799a1868d8a0a28a611da2ab642edf55ad8abb85f400c990d8804506671f

  • Size

    1.0MB

  • Sample

    230520-tt9n2afh7z

  • MD5

    36c00489c45aa1b2955dec3a683af90e

  • SHA1

    344c48e6f59efff429d9bc0c1c07d6801d7d450f

  • SHA256

    fcab799a1868d8a0a28a611da2ab642edf55ad8abb85f400c990d8804506671f

  • SHA512

    42da5111b193ab636dfb81b8e26dc6b479d510df75d20df74f7cc08bc1b4d53128d13c14ff042505be4628a6ae9eb69af35ede300c5084f1e7527f5c4bc829a1

  • SSDEEP

    24576:jyJHoI0dILBFm8zYpHlHcHW86UJDhYCDpt2a0JSZsjr8VUwH:2JHoI0I28zhHW/UJ6CFt2IYIVZ

Malware Config

Extracted

Family

redline

Botnet

meren

C2

77.91.68.253:19065

Attributes
  • auth_value

    a26557b435e44b55fdd4708fbba97d21

Targets

    • Target

      fcab799a1868d8a0a28a611da2ab642edf55ad8abb85f400c990d8804506671f

    • Size

      1.0MB

    • MD5

      36c00489c45aa1b2955dec3a683af90e

    • SHA1

      344c48e6f59efff429d9bc0c1c07d6801d7d450f

    • SHA256

      fcab799a1868d8a0a28a611da2ab642edf55ad8abb85f400c990d8804506671f

    • SHA512

      42da5111b193ab636dfb81b8e26dc6b479d510df75d20df74f7cc08bc1b4d53128d13c14ff042505be4628a6ae9eb69af35ede300c5084f1e7527f5c4bc829a1

    • SSDEEP

      24576:jyJHoI0dILBFm8zYpHlHcHW86UJDhYCDpt2a0JSZsjr8VUwH:2JHoI0I28zhHW/UJ6CFt2IYIVZ

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks