General

  • Target

    e8b83497bf60b61e3578dd46955968151e03468a567e3925d96aa3520801688a

  • Size

    1.0MB

  • Sample

    230521-z9732afd2y

  • MD5

    ae39030730ac71b2face02c1ab5c36ea

  • SHA1

    c4f272b57d397fff6451dd85d58b93b67a992b58

  • SHA256

    e8b83497bf60b61e3578dd46955968151e03468a567e3925d96aa3520801688a

  • SHA512

    919ab70a30a5d7d639b82cd6526ed80be006fa20c93155d4467db4eea91cd434906bcb2124b25ce08bbdec57869d67a0e8cf86df38a62fa90807d4bd2be2dd51

  • SSDEEP

    24576:ryL3L1zWTAFLhMKMdeJ65iwky6Wzq7yH/iubsYI5eTAAXK6a8T4:ebL1zsGDMdu65iwoL5eTAaK6aw

Malware Config

Extracted

Family

redline

Botnet

diza

C2

185.161.248.37:4138

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      e8b83497bf60b61e3578dd46955968151e03468a567e3925d96aa3520801688a

    • Size

      1.0MB

    • MD5

      ae39030730ac71b2face02c1ab5c36ea

    • SHA1

      c4f272b57d397fff6451dd85d58b93b67a992b58

    • SHA256

      e8b83497bf60b61e3578dd46955968151e03468a567e3925d96aa3520801688a

    • SHA512

      919ab70a30a5d7d639b82cd6526ed80be006fa20c93155d4467db4eea91cd434906bcb2124b25ce08bbdec57869d67a0e8cf86df38a62fa90807d4bd2be2dd51

    • SSDEEP

      24576:ryL3L1zWTAFLhMKMdeJ65iwky6Wzq7yH/iubsYI5eTAAXK6a8T4:ebL1zsGDMdu65iwoL5eTAaK6aw

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks