General

  • Target

    8b9c8069d855d524ecfa65c0d814516dba28c5f79d8501f785f392e34ebf6d11

  • Size

    1.0MB

  • Sample

    230521-lvt1zahd27

  • MD5

    fae853277fd9d233d8ed35e8efbac27b

  • SHA1

    ce20e8d6656dfab3870f354b0f75f6670c788ea5

  • SHA256

    8b9c8069d855d524ecfa65c0d814516dba28c5f79d8501f785f392e34ebf6d11

  • SHA512

    c7d82e8f0895e69a4f645fe19b0e87e188db8c4fb7807e5c5d2f41217be6c5434900034b49541ced76618490dac2555b8346b84064ded23dd015868465c20bdb

  • SSDEEP

    24576:WyTaWl+KuqVp8arGIFEuRX8dyaWHrBje+Q:lV49qn8arRX8YrBK+

Malware Config

Extracted

Family

redline

Botnet

diza

C2

185.161.248.37:4138

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      8b9c8069d855d524ecfa65c0d814516dba28c5f79d8501f785f392e34ebf6d11

    • Size

      1.0MB

    • MD5

      fae853277fd9d233d8ed35e8efbac27b

    • SHA1

      ce20e8d6656dfab3870f354b0f75f6670c788ea5

    • SHA256

      8b9c8069d855d524ecfa65c0d814516dba28c5f79d8501f785f392e34ebf6d11

    • SHA512

      c7d82e8f0895e69a4f645fe19b0e87e188db8c4fb7807e5c5d2f41217be6c5434900034b49541ced76618490dac2555b8346b84064ded23dd015868465c20bdb

    • SSDEEP

      24576:WyTaWl+KuqVp8arGIFEuRX8dyaWHrBje+Q:lV49qn8arRX8YrBK+

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks