General

  • Target

    2adee8fd561f70531b292d221470a34b.bin

  • Size

    986KB

  • Sample

    230522-bgna6adc34

  • MD5

    4007986f77703424d8a386fd4e3ad3d6

  • SHA1

    6a2d1f8500e3ae6bb518f157e1f1f636b90aefd6

  • SHA256

    dfedf8c76c225d2754d2da62a068dd30837f239fb7bc48f95c502b01e905ea31

  • SHA512

    ea4f87f47cee45d0b39e08139c51ea7a008261c7ac0b13fb62b9f2d8e289c7e89e5a4f181738106559149913ec3e3c7b5e171cb7ccfd363142e5632f29293241

  • SSDEEP

    24576:50JGc9lYUKndXTGO8a0aeI6RnB6JdVlPO0c/6AGkCNj:5Bc98dDGHaIf6n7O0c/DGVx

Malware Config

Extracted

Family

redline

Botnet

deren

C2

77.91.68.253:19065

Attributes
  • auth_value

    04a169f1fb198bfbeca74d0e06ea2d54

Targets

    • Target

      0a32d2d34c60e9376817d2be951c5bb4b35b78391c9d466aee51020b10cc96f4.exe

    • Size

      1.0MB

    • MD5

      2adee8fd561f70531b292d221470a34b

    • SHA1

      8a5de93f79a80c02db947a9949dc46f15475e013

    • SHA256

      0a32d2d34c60e9376817d2be951c5bb4b35b78391c9d466aee51020b10cc96f4

    • SHA512

      d13f6765415ec7c7336ab1a839f78efeab14b5740022dab8b07af6d2576de770067c7078e889f6137b0b6b7e7d144219324e9955a0922237ceff01c0e5e94bc9

    • SSDEEP

      24576:pywBBVEv67zG6KyQCz8GbpOft3usiM4tTA1gWF:cmB3zG6hL2F3usiM+Tz

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks