General

  • Target

    96971c721b2cc244519a5acbc0cca7691ebe490c5a6688b5e6a67484321ad72f

  • Size

    1.0MB

  • Sample

    230521-l88raacb2s

  • MD5

    b51bdbb590d81fa9791ab9d69f5b21d4

  • SHA1

    245af5ae9de8baea5e017874dc1847f5a6deff82

  • SHA256

    96971c721b2cc244519a5acbc0cca7691ebe490c5a6688b5e6a67484321ad72f

  • SHA512

    03b556b449242dde46a1f305dcb56bf38a2938c8eca10ae1841f7d0eee81b5c5b15195d3cf38f5944a7e25134c3c118dcad57b8391a71cd00872f04083bb9828

  • SSDEEP

    24576:PyFxDKpEa2EIjaytqbbt6ADxAnfX+XuxxYO9I0VX3:aFxDKpObWytqH0mGnGknS0d

Malware Config

Extracted

Family

redline

Botnet

mixa

C2

185.161.248.37:4138

Attributes
  • auth_value

    9d14534b25ac495ab25b59800acf3bb2

Targets

    • Target

      96971c721b2cc244519a5acbc0cca7691ebe490c5a6688b5e6a67484321ad72f

    • Size

      1.0MB

    • MD5

      b51bdbb590d81fa9791ab9d69f5b21d4

    • SHA1

      245af5ae9de8baea5e017874dc1847f5a6deff82

    • SHA256

      96971c721b2cc244519a5acbc0cca7691ebe490c5a6688b5e6a67484321ad72f

    • SHA512

      03b556b449242dde46a1f305dcb56bf38a2938c8eca10ae1841f7d0eee81b5c5b15195d3cf38f5944a7e25134c3c118dcad57b8391a71cd00872f04083bb9828

    • SSDEEP

      24576:PyFxDKpEa2EIjaytqbbt6ADxAnfX+XuxxYO9I0VX3:aFxDKpObWytqH0mGnGknS0d

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks