General

  • Target

    61c324927f3fe4d6037e60fd9e2b13c38f40a7d851b6acd33c38f3931e8e8322

  • Size

    1.0MB

  • Sample

    230521-ef37rsag2t

  • MD5

    80c82af778799898d82a1dfc52c61f48

  • SHA1

    3e08137de10c4052520878084b062ace70ac00b4

  • SHA256

    61c324927f3fe4d6037e60fd9e2b13c38f40a7d851b6acd33c38f3931e8e8322

  • SHA512

    494631e6a28a3db0be2800979dc4b9ece0597579f9ce1382ca7733815246dcafa84ae8ff411e5d0c9f38a5a8c3401fd81cdc9389fbc252c129cc9367852c1b7c

  • SSDEEP

    24576:ZyHiUDhrj2FSJ3QzF3I4lxRqqDqmDyp7Os:MHiUFfN3+bgayp

Malware Config

Extracted

Family

redline

Botnet

diza

C2

185.161.248.37:4138

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      61c324927f3fe4d6037e60fd9e2b13c38f40a7d851b6acd33c38f3931e8e8322

    • Size

      1.0MB

    • MD5

      80c82af778799898d82a1dfc52c61f48

    • SHA1

      3e08137de10c4052520878084b062ace70ac00b4

    • SHA256

      61c324927f3fe4d6037e60fd9e2b13c38f40a7d851b6acd33c38f3931e8e8322

    • SHA512

      494631e6a28a3db0be2800979dc4b9ece0597579f9ce1382ca7733815246dcafa84ae8ff411e5d0c9f38a5a8c3401fd81cdc9389fbc252c129cc9367852c1b7c

    • SSDEEP

      24576:ZyHiUDhrj2FSJ3QzF3I4lxRqqDqmDyp7Os:MHiUFfN3+bgayp

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks