General

  • Target

    cd57199d3aa426d7f7b0d75324d80062b750ac982b451c2dac917a21e728dfad

  • Size

    1.0MB

  • Sample

    230523-2na8aaaf61

  • MD5

    441a7c9a689f45bfe9c9899ece724580

  • SHA1

    81c4a23cfc105091c0ff89fc76b70b09e864e147

  • SHA256

    cd57199d3aa426d7f7b0d75324d80062b750ac982b451c2dac917a21e728dfad

  • SHA512

    780e42d1fe3392e205d0c859ee513b8e99fa4986670210c8663baaf7dc3176ceab7efbaccd6c9c04e59b9be176a4f600664ab01f934d9e74bd98759276a850cf

  • SSDEEP

    24576:pycyOYqNixBsvwUVkAGMW8sLNUHvQnyu/U0T834E/x:ccyOYqN2ZOdV3i6vQnd80TGd/

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.122:19062

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Targets

    • Target

      cd57199d3aa426d7f7b0d75324d80062b750ac982b451c2dac917a21e728dfad

    • Size

      1.0MB

    • MD5

      441a7c9a689f45bfe9c9899ece724580

    • SHA1

      81c4a23cfc105091c0ff89fc76b70b09e864e147

    • SHA256

      cd57199d3aa426d7f7b0d75324d80062b750ac982b451c2dac917a21e728dfad

    • SHA512

      780e42d1fe3392e205d0c859ee513b8e99fa4986670210c8663baaf7dc3176ceab7efbaccd6c9c04e59b9be176a4f600664ab01f934d9e74bd98759276a850cf

    • SSDEEP

      24576:pycyOYqNixBsvwUVkAGMW8sLNUHvQnyu/U0T834E/x:ccyOYqN2ZOdV3i6vQnd80TGd/

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks