General

  • Target

    61b1b88f6ac4a8a0c9b1b5d75cd8d1c1417fbe3804a87a7bcc34d653c5911a6a

  • Size

    1.0MB

  • Sample

    230521-qzmjxada9w

  • MD5

    e982f4a2c081e9658f17afb3dd783631

  • SHA1

    187f9229b397ac3d5522db2faa360c7d11769d0c

  • SHA256

    61b1b88f6ac4a8a0c9b1b5d75cd8d1c1417fbe3804a87a7bcc34d653c5911a6a

  • SHA512

    c0a77610b97c04faddc4faf8cbdb67981b6d2e53106b57bbdcae29ea186e35a6fbffc548d82863e42cf71710a9b6f851b015c0aa3ed916e79887321cfae24313

  • SSDEEP

    24576:qydkvOWxPdBptOS6XsqMteyI6rX/gduG4/PjQ0ZXTtbE:xdkXL76XsqMgyIaXY03/rLpT

Malware Config

Extracted

Family

redline

Botnet

mixa

C2

185.161.248.37:4138

Attributes
  • auth_value

    9d14534b25ac495ab25b59800acf3bb2

Targets

    • Target

      61b1b88f6ac4a8a0c9b1b5d75cd8d1c1417fbe3804a87a7bcc34d653c5911a6a

    • Size

      1.0MB

    • MD5

      e982f4a2c081e9658f17afb3dd783631

    • SHA1

      187f9229b397ac3d5522db2faa360c7d11769d0c

    • SHA256

      61b1b88f6ac4a8a0c9b1b5d75cd8d1c1417fbe3804a87a7bcc34d653c5911a6a

    • SHA512

      c0a77610b97c04faddc4faf8cbdb67981b6d2e53106b57bbdcae29ea186e35a6fbffc548d82863e42cf71710a9b6f851b015c0aa3ed916e79887321cfae24313

    • SSDEEP

      24576:qydkvOWxPdBptOS6XsqMteyI6rX/gduG4/PjQ0ZXTtbE:xdkXL76XsqMgyIaXY03/rLpT

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks