General

  • Target

    a5988a1af6261bca51896295c677028a9c9b175c5fa9338e2b5aee4bf6a859c0

  • Size

    1.0MB

  • Sample

    230521-mp9pxahe22

  • MD5

    2d612a2fe9ca705de28e3cbd4338da04

  • SHA1

    9b9a0343905bf7916b90758109a8ef445ed84bf4

  • SHA256

    a5988a1af6261bca51896295c677028a9c9b175c5fa9338e2b5aee4bf6a859c0

  • SHA512

    c3671673b75ad86341f14386101896b7e4bbdc4b589219c95e05d29a9919882adcb4c71f3ee3558604dc63c286d1c561268c0a1f6b507e689274871829b6916d

  • SSDEEP

    24576:uydh4YWW8ZWDqQRq5Zwr68kelpL4zNTXaCkaa3:9D4Yf8ADHRq5Zf8d7QTqFa

Malware Config

Extracted

Family

redline

Botnet

mixa

C2

185.161.248.37:4138

Attributes
  • auth_value

    9d14534b25ac495ab25b59800acf3bb2

Targets

    • Target

      a5988a1af6261bca51896295c677028a9c9b175c5fa9338e2b5aee4bf6a859c0

    • Size

      1.0MB

    • MD5

      2d612a2fe9ca705de28e3cbd4338da04

    • SHA1

      9b9a0343905bf7916b90758109a8ef445ed84bf4

    • SHA256

      a5988a1af6261bca51896295c677028a9c9b175c5fa9338e2b5aee4bf6a859c0

    • SHA512

      c3671673b75ad86341f14386101896b7e4bbdc4b589219c95e05d29a9919882adcb4c71f3ee3558604dc63c286d1c561268c0a1f6b507e689274871829b6916d

    • SSDEEP

      24576:uydh4YWW8ZWDqQRq5Zwr68kelpL4zNTXaCkaa3:9D4Yf8ADHRq5Zf8d7QTqFa

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks