General

  • Target

    32332948.exe

  • Size

    1.0MB

  • Sample

    230521-myv8wahe59

  • MD5

    d55cf446274f65272083e413315bbb87

  • SHA1

    64f2e2a216d525e5ca9ca50787e2f427e6926dea

  • SHA256

    a51ce6538c362311c8b0d9937afc85edbf3ce14f42f2742973fc916774f53c21

  • SHA512

    c29512c2e3960454ad4df6841a3e114733faa34c179696b4f8ec98effb8a32300cfe20e3da2b5d982ae2545beb35477e15471f7be6d705cc993c70c511cf2d0b

  • SSDEEP

    24576:kyRCON1f6MCqw/HGV3DB1MFKltnt9uEGsh5fn48mi:zRCMF6MCqwPGV3DB2o7nt9Thy8

Malware Config

Extracted

Family

redline

Botnet

mixa

C2

185.161.248.37:4138

Attributes
  • auth_value

    9d14534b25ac495ab25b59800acf3bb2

Targets

    • Target

      32332948.exe

    • Size

      1.0MB

    • MD5

      d55cf446274f65272083e413315bbb87

    • SHA1

      64f2e2a216d525e5ca9ca50787e2f427e6926dea

    • SHA256

      a51ce6538c362311c8b0d9937afc85edbf3ce14f42f2742973fc916774f53c21

    • SHA512

      c29512c2e3960454ad4df6841a3e114733faa34c179696b4f8ec98effb8a32300cfe20e3da2b5d982ae2545beb35477e15471f7be6d705cc993c70c511cf2d0b

    • SSDEEP

      24576:kyRCON1f6MCqw/HGV3DB1MFKltnt9uEGsh5fn48mi:zRCMF6MCqwPGV3DB2o7nt9Thy8

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks