General

  • Target

    66234204.exe

  • Size

    1.0MB

  • Sample

    230521-r1v34sdc71

  • MD5

    88c8121df0f8b44d38ab765b8f8c002a

  • SHA1

    845df938995ff66ca48b8a9e2a977e281eaab4e0

  • SHA256

    453fb3f5cdb8508197bfedcd8ecd7505961d2913fa4a0ca8fbe569f31bcbc4ab

  • SHA512

    e4d51e6c8e69b8df068c9ce940ca977dcd638e42bb81213b42fbf606b93065ca273ef41a99362ef5ea61762230b6c7eb1706369b6ab65d41b4679654798f87ca

  • SSDEEP

    24576:jy4V1ewTQJqNUqT67e7g7v/f8ctTLFT/+iJ5Vufk7kQO2:24V15T6qNUqT66Ub/RFFr++cfGkT

Malware Config

Extracted

Family

redline

Botnet

mixa

C2

185.161.248.37:4138

Attributes
  • auth_value

    9d14534b25ac495ab25b59800acf3bb2

Targets

    • Target

      66234204.exe

    • Size

      1.0MB

    • MD5

      88c8121df0f8b44d38ab765b8f8c002a

    • SHA1

      845df938995ff66ca48b8a9e2a977e281eaab4e0

    • SHA256

      453fb3f5cdb8508197bfedcd8ecd7505961d2913fa4a0ca8fbe569f31bcbc4ab

    • SHA512

      e4d51e6c8e69b8df068c9ce940ca977dcd638e42bb81213b42fbf606b93065ca273ef41a99362ef5ea61762230b6c7eb1706369b6ab65d41b4679654798f87ca

    • SSDEEP

      24576:jy4V1ewTQJqNUqT67e7g7v/f8ctTLFT/+iJ5Vufk7kQO2:24V15T6qNUqT66Ub/RFFr++cfGkT

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks