General

  • Target

    c604b9aa3249a443371bd4d1b0bdf552.bin

  • Size

    985KB

  • Sample

    230522-b2a7bsgc2t

  • MD5

    f490479012f8df56ddbc83a8ea680304

  • SHA1

    26ec5eecc4cfa80c26cbc101cfe69bc209ee06b0

  • SHA256

    817da3f65539e095ea7bed5980eb576994e446dc4bfd529714f6c2a107c05721

  • SHA512

    2c14a3676cc6b55200df65f40ca9c2fcf2eb838852758b8ede18de053e9ac4c9bb4cdf5085bed2d91bae397cf7b5124bfbe4c7fb42b4f9913a8ff953811944c2

  • SSDEEP

    24576:P5toti4bdUQWYwyz0OQg7CozHxEX2Od/uyHLxirYw4NDLu:BytrJUTY90OQg7CoV62hyHcADa

Malware Config

Extracted

Family

redline

Botnet

daza

C2

77.91.124.251:19065

Attributes
  • auth_value

    0bd5963efefdd6409185423d5ca3439c

Targets

    • Target

      5a34bfde198e8455a3c4c47cdc7592ec250ab45b44c45cef00152bc6e05f78e0.exe

    • Size

      1.0MB

    • MD5

      c604b9aa3249a443371bd4d1b0bdf552

    • SHA1

      9a444165f8d8c737261a20fcac6196703126ceac

    • SHA256

      5a34bfde198e8455a3c4c47cdc7592ec250ab45b44c45cef00152bc6e05f78e0

    • SHA512

      47265d891c9a3d0603a6abb5bfaeb3f42ab1d8ebd360eb455e223b0a9a5779f57a60989301856c8806f7c549aae62fd710a6fb4423a0849961ab46f3a110f7bf

    • SSDEEP

      24576:Ey184IHXcyZkNVEzEBrgpv3pIEECofcBH5u5Ii:T64I3cvRrIBIEHgccI

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks