General

  • Target

    5eaaa7c6104aa337ef78ecbd8e9c89f26dc2aa4888b3a3e0bb065dc199892465

  • Size

    1.0MB

  • Sample

    230523-lsg9dsef83

  • MD5

    dfa8e0ffb6cb727924820c633c3d529e

  • SHA1

    15ec2a840c4f37b7f1e79759b25f329a4368fe35

  • SHA256

    5eaaa7c6104aa337ef78ecbd8e9c89f26dc2aa4888b3a3e0bb065dc199892465

  • SHA512

    2f8529a30041f07bb7091e0af23a0f537723f5eddd974d135af3ceab2eddd8eb40b31092e89d467f8f84e251c6f5f073bd0c470920c9141c57e45a61a33bac12

  • SSDEEP

    24576:1yb45PmKCUXS4iqLPnD0v5N0tBa4+uadOmsl/jSnskTrh:Qb4dNXxiqf++a4+xdvsl/Gnsy

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.122:19062

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Targets

    • Target

      5eaaa7c6104aa337ef78ecbd8e9c89f26dc2aa4888b3a3e0bb065dc199892465

    • Size

      1.0MB

    • MD5

      dfa8e0ffb6cb727924820c633c3d529e

    • SHA1

      15ec2a840c4f37b7f1e79759b25f329a4368fe35

    • SHA256

      5eaaa7c6104aa337ef78ecbd8e9c89f26dc2aa4888b3a3e0bb065dc199892465

    • SHA512

      2f8529a30041f07bb7091e0af23a0f537723f5eddd974d135af3ceab2eddd8eb40b31092e89d467f8f84e251c6f5f073bd0c470920c9141c57e45a61a33bac12

    • SSDEEP

      24576:1yb45PmKCUXS4iqLPnD0v5N0tBa4+uadOmsl/jSnskTrh:Qb4dNXxiqf++a4+xdvsl/Gnsy

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks