General

  • Target

    7ae6cf5b23d9e57e73a9a19d0829f95b525c6cdcd705054b45e43942e1e9f096

  • Size

    1.0MB

  • Sample

    230521-h2zm9agf79

  • MD5

    3c324c0848b39794bb99b97c54f282fb

  • SHA1

    1348498a970d87692862743b38699e6ec242ee88

  • SHA256

    7ae6cf5b23d9e57e73a9a19d0829f95b525c6cdcd705054b45e43942e1e9f096

  • SHA512

    c0ad1cda3460a8a1b557660779791388fc999509e4a98ff844dfb1c55dd9c57b8a088a39d6e35ce37207fa62a12f9ef0533dcf4a7840b33c80ad31303d824fdd

  • SSDEEP

    24576:SyjYki5yj7qwtVWmZ7kXkt06rY/dsbTor:5ckiMnqwnWgMk/MdsT

Malware Config

Extracted

Family

redline

Botnet

mixa

C2

185.161.248.37:4138

Attributes
  • auth_value

    9d14534b25ac495ab25b59800acf3bb2

Targets

    • Target

      7ae6cf5b23d9e57e73a9a19d0829f95b525c6cdcd705054b45e43942e1e9f096

    • Size

      1.0MB

    • MD5

      3c324c0848b39794bb99b97c54f282fb

    • SHA1

      1348498a970d87692862743b38699e6ec242ee88

    • SHA256

      7ae6cf5b23d9e57e73a9a19d0829f95b525c6cdcd705054b45e43942e1e9f096

    • SHA512

      c0ad1cda3460a8a1b557660779791388fc999509e4a98ff844dfb1c55dd9c57b8a088a39d6e35ce37207fa62a12f9ef0533dcf4a7840b33c80ad31303d824fdd

    • SSDEEP

      24576:SyjYki5yj7qwtVWmZ7kXkt06rY/dsbTor:5ckiMnqwnWgMk/MdsT

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks