General

  • Target

    b2be94f81031769ba1b7139b6630a56ceb1af8bddd4974eb790e0babcbc29489

  • Size

    1.0MB

  • Sample

    230521-td2cqaba67

  • MD5

    d8a235d51d36abb78d3b593c133cb367

  • SHA1

    ebcd9db75420377b57d319fe5afadf02d421e910

  • SHA256

    b2be94f81031769ba1b7139b6630a56ceb1af8bddd4974eb790e0babcbc29489

  • SHA512

    4302b0d8deb70977675e90c98b874b43054f9a1184ab7c1e2e01b6d8660cafc79e1fc0c75e99f8c192f9a2af1a65bc7943c379598bf49d536090b419a8e67c0e

  • SSDEEP

    24576:zyca6EQtxsqqSPVim/ldmQy8YkZvogz8oS5k:GcaQfqSIm/ls9kZvoFoS5

Malware Config

Extracted

Family

redline

Botnet

mixa

C2

185.161.248.37:4138

Attributes
  • auth_value

    9d14534b25ac495ab25b59800acf3bb2

Targets

    • Target

      b2be94f81031769ba1b7139b6630a56ceb1af8bddd4974eb790e0babcbc29489

    • Size

      1.0MB

    • MD5

      d8a235d51d36abb78d3b593c133cb367

    • SHA1

      ebcd9db75420377b57d319fe5afadf02d421e910

    • SHA256

      b2be94f81031769ba1b7139b6630a56ceb1af8bddd4974eb790e0babcbc29489

    • SHA512

      4302b0d8deb70977675e90c98b874b43054f9a1184ab7c1e2e01b6d8660cafc79e1fc0c75e99f8c192f9a2af1a65bc7943c379598bf49d536090b419a8e67c0e

    • SSDEEP

      24576:zyca6EQtxsqqSPVim/ldmQy8YkZvogz8oS5k:GcaQfqSIm/ls9kZvoFoS5

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks