General

  • Target

    finder587.exe

  • Size

    1.0MB

  • Sample

    230521-r7nydaag37

  • MD5

    797aa304ca6c0c2a6a73a3fb168c4754

  • SHA1

    910adf88b51ba4eadddc376597b7ec0a858c49a4

  • SHA256

    f6fcb272d535379c26f49878337267928aa588f0ad44d952889b84867a557ad1

  • SHA512

    542008b681232a2630817ceea7557e33f0609e077af79cfad2d925ac15f7c545f0b1f4487599d0097ceff23cfe0bd8379fd8c308c01208a62b506c073a60058f

  • SSDEEP

    24576:pyhds0SCracCPUqCv57a6i1Z5/v2XYQo8tC9Ovki:cbhSCeDPUqCxG6aZ5/vktC9O8

Malware Config

Extracted

Family

redline

Botnet

mixa

C2

185.161.248.37:4138

Attributes
  • auth_value

    9d14534b25ac495ab25b59800acf3bb2

Targets

    • Target

      finder587.exe

    • Size

      1.0MB

    • MD5

      797aa304ca6c0c2a6a73a3fb168c4754

    • SHA1

      910adf88b51ba4eadddc376597b7ec0a858c49a4

    • SHA256

      f6fcb272d535379c26f49878337267928aa588f0ad44d952889b84867a557ad1

    • SHA512

      542008b681232a2630817ceea7557e33f0609e077af79cfad2d925ac15f7c545f0b1f4487599d0097ceff23cfe0bd8379fd8c308c01208a62b506c073a60058f

    • SSDEEP

      24576:pyhds0SCracCPUqCv57a6i1Z5/v2XYQo8tC9Ovki:cbhSCeDPUqCxG6aZ5/vktC9O8

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks