General

  • Target

    485ffe82ca01c800938a32c67af8865af34488c016329e92f7b7ac034cec6ebf

  • Size

    1.0MB

  • Sample

    230521-d1qazaga53

  • MD5

    a328b0bcdbf9acc083c220f2c1447982

  • SHA1

    cfe3d359e7fdfdfab9e0b45d5c052621e94ea684

  • SHA256

    485ffe82ca01c800938a32c67af8865af34488c016329e92f7b7ac034cec6ebf

  • SHA512

    2f30335de8bdbf5689995f5dafe4a990c60ca266f8b80d4708d1dc090fda876aab4dbed18757d0ea1b79c9b358711191427329a56f83f70966348427d7c4e850

  • SSDEEP

    24576:ZyAmZV9PO8FyqBUJzJnvyHazVnOezm5IVAtMT9m1g:MAmpPZIqBUJzJaOOeyGVACT9m

Malware Config

Extracted

Family

redline

Botnet

mixa

C2

185.161.248.37:4138

Attributes
  • auth_value

    9d14534b25ac495ab25b59800acf3bb2

Targets

    • Target

      485ffe82ca01c800938a32c67af8865af34488c016329e92f7b7ac034cec6ebf

    • Size

      1.0MB

    • MD5

      a328b0bcdbf9acc083c220f2c1447982

    • SHA1

      cfe3d359e7fdfdfab9e0b45d5c052621e94ea684

    • SHA256

      485ffe82ca01c800938a32c67af8865af34488c016329e92f7b7ac034cec6ebf

    • SHA512

      2f30335de8bdbf5689995f5dafe4a990c60ca266f8b80d4708d1dc090fda876aab4dbed18757d0ea1b79c9b358711191427329a56f83f70966348427d7c4e850

    • SSDEEP

      24576:ZyAmZV9PO8FyqBUJzJnvyHazVnOezm5IVAtMT9m1g:MAmpPZIqBUJzJaOOeyGVACT9m

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks