General

  • Target

    installer593.exe

  • Size

    1.0MB

  • Sample

    230521-m87pnacd7w

  • MD5

    fe9fbbf642164c8749137c05e6199fe1

  • SHA1

    abf23c5383374d42e9e9176ebea461e8f28a6a23

  • SHA256

    4d935f187e3f7ec3bd513791dea85808d735ac3d2268d24c7c4100ac36234a05

  • SHA512

    5c30385cea9869b6bc64314a19ae25d612806cee968d3dedb850dc252ffb4e1cfc35f66f0004e4e81b20f87c846fc22c9cdb2ee1b523a61db99493a7c554333b

  • SSDEEP

    24576:cyQmSDZc+ewcQYxbZdxL0ohbVKbZwoDA8jUXsxGct9X6:LoDZ7LobFNKrMmUXOG

Malware Config

Extracted

Family

redline

Botnet

diza

C2

185.161.248.37:4138

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      installer593.exe

    • Size

      1.0MB

    • MD5

      fe9fbbf642164c8749137c05e6199fe1

    • SHA1

      abf23c5383374d42e9e9176ebea461e8f28a6a23

    • SHA256

      4d935f187e3f7ec3bd513791dea85808d735ac3d2268d24c7c4100ac36234a05

    • SHA512

      5c30385cea9869b6bc64314a19ae25d612806cee968d3dedb850dc252ffb4e1cfc35f66f0004e4e81b20f87c846fc22c9cdb2ee1b523a61db99493a7c554333b

    • SSDEEP

      24576:cyQmSDZc+ewcQYxbZdxL0ohbVKbZwoDA8jUXsxGct9X6:LoDZ7LobFNKrMmUXOG

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks