General

  • Target

    1b8b2d6453bf8c451d8b5510f65b2aafeb5f5cf3a16a1718ac69c9952d1108cc

  • Size

    1.0MB

  • Sample

    230521-yevc1sca55

  • MD5

    5b127289988300a00079d7f407bde736

  • SHA1

    6f19c35722596db7ef1628cdd8a10b06e033a1c3

  • SHA256

    1b8b2d6453bf8c451d8b5510f65b2aafeb5f5cf3a16a1718ac69c9952d1108cc

  • SHA512

    280d9f9794d90c328cf2221b67763a9962950f9bc60a8da875d2fe9547eda9ebf75ad09b1b3caf693b0a34c1a2d336fd87257e7ff4a169543f345bd7841a47f2

  • SSDEEP

    24576:ZyA16qNqZT1om+X0dsqGqUGFC5wc3BT16fE:MAgqN2ZovXrqG2oBh

Malware Config

Extracted

Family

redline

Botnet

mixa

C2

185.161.248.37:4138

Attributes
  • auth_value

    9d14534b25ac495ab25b59800acf3bb2

Targets

    • Target

      1b8b2d6453bf8c451d8b5510f65b2aafeb5f5cf3a16a1718ac69c9952d1108cc

    • Size

      1.0MB

    • MD5

      5b127289988300a00079d7f407bde736

    • SHA1

      6f19c35722596db7ef1628cdd8a10b06e033a1c3

    • SHA256

      1b8b2d6453bf8c451d8b5510f65b2aafeb5f5cf3a16a1718ac69c9952d1108cc

    • SHA512

      280d9f9794d90c328cf2221b67763a9962950f9bc60a8da875d2fe9547eda9ebf75ad09b1b3caf693b0a34c1a2d336fd87257e7ff4a169543f345bd7841a47f2

    • SSDEEP

      24576:ZyA16qNqZT1om+X0dsqGqUGFC5wc3BT16fE:MAgqN2ZovXrqG2oBh

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks