General

  • Target

    ec3e3c1d5f4cdada01e3b0e498784576a72ac59260e0486de374cf43a64581f9

  • Size

    1.0MB

  • Sample

    230521-grn84aba9y

  • MD5

    9ac3ca591755f06f0071dd5b6fa6eb99

  • SHA1

    7bd1514589a16a8f6bef176babacc677d9cd33b5

  • SHA256

    ec3e3c1d5f4cdada01e3b0e498784576a72ac59260e0486de374cf43a64581f9

  • SHA512

    2d64d9dca7481e15ba78642618ae721551e4cb81a650cccb147242cdf7c78e253e32c95c995f0f7a7a485b2b534ac80f3b887d3bf0da911867b34e63740b7664

  • SSDEEP

    24576:AyH9QkcayJ6pTYUzUc/6re2mrFS6RHEE6BH10:HSAyQuLeRSibAV

Malware Config

Extracted

Family

redline

Botnet

diza

C2

185.161.248.37:4138

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      ec3e3c1d5f4cdada01e3b0e498784576a72ac59260e0486de374cf43a64581f9

    • Size

      1.0MB

    • MD5

      9ac3ca591755f06f0071dd5b6fa6eb99

    • SHA1

      7bd1514589a16a8f6bef176babacc677d9cd33b5

    • SHA256

      ec3e3c1d5f4cdada01e3b0e498784576a72ac59260e0486de374cf43a64581f9

    • SHA512

      2d64d9dca7481e15ba78642618ae721551e4cb81a650cccb147242cdf7c78e253e32c95c995f0f7a7a485b2b534ac80f3b887d3bf0da911867b34e63740b7664

    • SSDEEP

      24576:AyH9QkcayJ6pTYUzUc/6re2mrFS6RHEE6BH10:HSAyQuLeRSibAV

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks