General

  • Target

    0f343b97c51df7d0e78c5f62ee445a696bafe048344ac34ac881a15842200862

  • Size

    1.0MB

  • Sample

    230521-k319ksbh5s

  • MD5

    8c0d604ecea209bb725cd4826655e578

  • SHA1

    476c0f6f5c2fe79b4c66128d60bdcbcb96192477

  • SHA256

    0f343b97c51df7d0e78c5f62ee445a696bafe048344ac34ac881a15842200862

  • SHA512

    ae372a52ee56580c249d9bc8c2c548402ce436ca6dad7d3843a047bb418a2a11753bb8a4da0f1e862ccb8d236cc5dc58f1e1d68ad68c567142bde97438359b82

  • SSDEEP

    24576:RyRKvkGesHtqwf3EGK1x6Gc+uhswP8pr/wIBbz:EWVtqiU1x6GcPhjP8prYIBb

Malware Config

Extracted

Family

redline

Botnet

diza

C2

185.161.248.37:4138

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      0f343b97c51df7d0e78c5f62ee445a696bafe048344ac34ac881a15842200862

    • Size

      1.0MB

    • MD5

      8c0d604ecea209bb725cd4826655e578

    • SHA1

      476c0f6f5c2fe79b4c66128d60bdcbcb96192477

    • SHA256

      0f343b97c51df7d0e78c5f62ee445a696bafe048344ac34ac881a15842200862

    • SHA512

      ae372a52ee56580c249d9bc8c2c548402ce436ca6dad7d3843a047bb418a2a11753bb8a4da0f1e862ccb8d236cc5dc58f1e1d68ad68c567142bde97438359b82

    • SSDEEP

      24576:RyRKvkGesHtqwf3EGK1x6Gc+uhswP8pr/wIBbz:EWVtqiU1x6GcPhjP8prYIBb

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks