General

  • Target

    8a40456715b24bde508ccb40f22204ce.bin

  • Size

    987KB

  • Sample

    230522-bs36radc97

  • MD5

    65207f4d659dedd24c4d465a153b1b25

  • SHA1

    6631846f0be5ec8b49dfaddcd9c530db73b713c4

  • SHA256

    cea93cc136016ff56b02a82893d5fbfc6e0a482f93b17ca2ad4c709bf5751a7c

  • SHA512

    cb456f3f652bc494e4f230a0af9516d70a2c2d89bd2d5bdeb692b04216cb145a254de2d488126d71ff3c2b684ab242f8b445e7675a64419f209a7c006be410c9

  • SSDEEP

    24576:2AivVHNWc0a/6ur9nzDjlyz2BBbiIv2a65R2UhF4/:2Aivic0WtRDqa/2a4Hg/

Malware Config

Extracted

Family

redline

Botnet

maxa

C2

77.91.124.251:19065

Attributes
  • auth_value

    3c06ec6b3eea9db7536a57bcc13f5bef

Targets

    • Target

      9fa6fc0f8ba740bcd34ab0336d1c88d6d9a8f30e7cbd40870494710dbf7c40cd.exe

    • Size

      1.0MB

    • MD5

      8a40456715b24bde508ccb40f22204ce

    • SHA1

      296761e80931eaf3ac186dbb1121b0431d2499a4

    • SHA256

      9fa6fc0f8ba740bcd34ab0336d1c88d6d9a8f30e7cbd40870494710dbf7c40cd

    • SHA512

      86e0d634297e896b08a7ba967e9f5e1ca7df94d3fd3c50b968b8965a0e744a56d6065a8597d19bb96201249a978b00ba5cd1982bab8a8249b3d159ba0e5e9096

    • SSDEEP

      24576:9ywQpM59BqgPClWM4n/CiIJSgqViCCLPmWnb:YwyMdqh4n//iP

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks