General

  • Target

    installer.exe

  • Size

    1.0MB

  • Sample

    230520-vekxssgb5t

  • MD5

    af413a671bb8aef2f76f8b8d22d5ee1a

  • SHA1

    ed7c0c45310a7db29da4f057f3ab0b22cc4f760e

  • SHA256

    4006f6e1086f3cc7ac04099ee5c4fe312f12abe4fc39c277028bb7142290ee06

  • SHA512

    50f67ce4c09ab31d07005a222b1617c545d5fb479775dbf60dd331d2ae33f2f9489a04874cafdcdaf54243edf1c30ddce6d032c9c463563e5a6093a324256826

  • SSDEEP

    24576:iyDlBPutBbByGm4zxmgGg4PAgWKzV95O/vsUIjQ0tfDmS:JbPKBbYb4MgGgx5KHjQ0hDm

Malware Config

Extracted

Family

redline

Botnet

leren

C2

77.91.68.253:19065

Attributes
  • auth_value

    4002956b5a03c59e4252363b86bc7713

Targets

    • Target

      installer.exe

    • Size

      1.0MB

    • MD5

      af413a671bb8aef2f76f8b8d22d5ee1a

    • SHA1

      ed7c0c45310a7db29da4f057f3ab0b22cc4f760e

    • SHA256

      4006f6e1086f3cc7ac04099ee5c4fe312f12abe4fc39c277028bb7142290ee06

    • SHA512

      50f67ce4c09ab31d07005a222b1617c545d5fb479775dbf60dd331d2ae33f2f9489a04874cafdcdaf54243edf1c30ddce6d032c9c463563e5a6093a324256826

    • SSDEEP

      24576:iyDlBPutBbByGm4zxmgGg4PAgWKzV95O/vsUIjQ0tfDmS:JbPKBbYb4MgGgx5KHjQ0hDm

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks