General

  • Target

    translator902.exe

  • Size

    1020KB

  • Sample

    230521-m5kqqahf68

  • MD5

    23276c30da32c53bf7590430229af1ba

  • SHA1

    3640076f68e95021dea075166e943fa9c555c96b

  • SHA256

    919504138b778539b9744c620a6a134ad685a0d7aa8eda719930b80c56798349

  • SHA512

    00b272c59921923423901d94e120bdd1036c2f7c0dcc048d2fab75ad30794b37fa3714b637ba280e93a2ceb56ae1a851973cbc34f32b593bb2d781c92787ccd4

  • SSDEEP

    24576:DyK+RD59eqi4HVxRqwEm1r2QlFHAwQFM2r4wv7:WbRDq4HVxRqwEm1rh1AZM0

Malware Config

Extracted

Family

redline

Botnet

luza

C2

185.161.248.37:4138

Attributes
  • auth_value

    1261701914d508e02e8b4f25d38bc7f9

Targets

    • Target

      translator902.exe

    • Size

      1020KB

    • MD5

      23276c30da32c53bf7590430229af1ba

    • SHA1

      3640076f68e95021dea075166e943fa9c555c96b

    • SHA256

      919504138b778539b9744c620a6a134ad685a0d7aa8eda719930b80c56798349

    • SHA512

      00b272c59921923423901d94e120bdd1036c2f7c0dcc048d2fab75ad30794b37fa3714b637ba280e93a2ceb56ae1a851973cbc34f32b593bb2d781c92787ccd4

    • SSDEEP

      24576:DyK+RD59eqi4HVxRqwEm1r2QlFHAwQFM2r4wv7:WbRDq4HVxRqwEm1rh1AZM0

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks