General

  • Target

    launcher.exe

  • Size

    1.0MB

  • Sample

    230520-z7mz3seg48

  • MD5

    9bd14f82c401fc2609e4a8dee3529e6d

  • SHA1

    d7049289ab22cf0a5cd237d1956a14ba414fb42e

  • SHA256

    ab8b4f42528db2341e4dfc452d8f3b806eeb7c2ed8c2057c79b370ae7a0d4f5e

  • SHA512

    730f75dca66e405570b14e54f3b22ba6a564e22c6c7d698a053fa67bfa7b6c7bacccc763f975b243c6fee1439f783e2a6514195759bc98137877ea40a34df83e

  • SSDEEP

    24576:iyopzp/gWPoDErZKft8kIta6mfmgAw+JzV0nBlXZ0NsW8:JopzSaoDP+kItJg8aBlpYsW

Malware Config

Extracted

Family

redline

Botnet

daza

C2

77.91.124.251:19065

Attributes
  • auth_value

    0bd5963efefdd6409185423d5ca3439c

Targets

    • Target

      launcher.exe

    • Size

      1.0MB

    • MD5

      9bd14f82c401fc2609e4a8dee3529e6d

    • SHA1

      d7049289ab22cf0a5cd237d1956a14ba414fb42e

    • SHA256

      ab8b4f42528db2341e4dfc452d8f3b806eeb7c2ed8c2057c79b370ae7a0d4f5e

    • SHA512

      730f75dca66e405570b14e54f3b22ba6a564e22c6c7d698a053fa67bfa7b6c7bacccc763f975b243c6fee1439f783e2a6514195759bc98137877ea40a34df83e

    • SSDEEP

      24576:iyopzp/gWPoDErZKft8kIta6mfmgAw+JzV0nBlXZ0NsW8:JopzSaoDP+kItJg8aBlpYsW

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks