General

  • Target

    09bbf32bc6c1a606ba4693536e24920c71cd4407c92e94079f076c4cbb7cfad7

  • Size

    1.0MB

  • Sample

    230520-x6kgfsgh4t

  • MD5

    247e7678eef91c1dfa0a274c6522fbe7

  • SHA1

    0f2d12a351c89d75aa701b6f777a139500316871

  • SHA256

    09bbf32bc6c1a606ba4693536e24920c71cd4407c92e94079f076c4cbb7cfad7

  • SHA512

    80ba6e29567868f903099a16815075ef4b88a458ce5e0f9e2137034e9b090e2a4ff9b3b7d962b75294ce7c70ca9f677628e6372730fee8ddae0f66ee9ae4a0f5

  • SSDEEP

    24576:/yhsIVLjEkM7LmbohnqYhmU8hFtOtCmczsV9uTGCUpLz:KhhljEAohnqYEJT4tCzQru6CuL

Malware Config

Extracted

Family

redline

Botnet

daza

C2

77.91.124.251:19065

Attributes
  • auth_value

    0bd5963efefdd6409185423d5ca3439c

Targets

    • Target

      09bbf32bc6c1a606ba4693536e24920c71cd4407c92e94079f076c4cbb7cfad7

    • Size

      1.0MB

    • MD5

      247e7678eef91c1dfa0a274c6522fbe7

    • SHA1

      0f2d12a351c89d75aa701b6f777a139500316871

    • SHA256

      09bbf32bc6c1a606ba4693536e24920c71cd4407c92e94079f076c4cbb7cfad7

    • SHA512

      80ba6e29567868f903099a16815075ef4b88a458ce5e0f9e2137034e9b090e2a4ff9b3b7d962b75294ce7c70ca9f677628e6372730fee8ddae0f66ee9ae4a0f5

    • SSDEEP

      24576:/yhsIVLjEkM7LmbohnqYhmU8hFtOtCmczsV9uTGCUpLz:KhhljEAohnqYEJT4tCzQru6CuL

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks