General

  • Target

    preview.exe

  • Size

    1.0MB

  • Sample

    230520-wrv4zagf3z

  • MD5

    4aff1159a73a3ebc70d0cc27cfd60e03

  • SHA1

    140875013320ef0d331d95a7013bd7ade94bc912

  • SHA256

    191b5829fafbcf01e5ac0a030112ecd5b9c47e1f96f8b434a3d01f7f033ba899

  • SHA512

    dc4bb23a5866ad42b6e3f929e999b23074b6f09c6a8912416ff2af8b9defe3286339a5fd37dab9946f785ca214c60b6db04fe3739331f7e90116442207414786

  • SSDEEP

    24576:PyF64QvqQkzqwJLQfp/ff0DgiHi7mgTYLNLTn:ag4ykzqDdLPTYLx

Malware Config

Extracted

Family

redline

Botnet

maxa

C2

77.91.124.251:19065

Attributes
  • auth_value

    3c06ec6b3eea9db7536a57bcc13f5bef

Targets

    • Target

      preview.exe

    • Size

      1.0MB

    • MD5

      4aff1159a73a3ebc70d0cc27cfd60e03

    • SHA1

      140875013320ef0d331d95a7013bd7ade94bc912

    • SHA256

      191b5829fafbcf01e5ac0a030112ecd5b9c47e1f96f8b434a3d01f7f033ba899

    • SHA512

      dc4bb23a5866ad42b6e3f929e999b23074b6f09c6a8912416ff2af8b9defe3286339a5fd37dab9946f785ca214c60b6db04fe3739331f7e90116442207414786

    • SSDEEP

      24576:PyF64QvqQkzqwJLQfp/ff0DgiHi7mgTYLNLTn:ag4ykzqDdLPTYLx

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks