General

  • Target

    d0f36a35fb56545996e73a8c4fb3aba997433f6fc04bd52e8a842836b4bc89a0

  • Size

    1.0MB

  • Sample

    230523-xhe7tsgg27

  • MD5

    d1a9376ee30e36bcaf265e013a6825e6

  • SHA1

    1f64482685594803ed624a433ddae88d0aac2c76

  • SHA256

    d0f36a35fb56545996e73a8c4fb3aba997433f6fc04bd52e8a842836b4bc89a0

  • SHA512

    dc2b14f775c650bd6a3faff5d0633ec432a4e0db1c1bee1499e4ca983489e09dfba42c7078421a327ceac2947097e3cb8ecedd2bc312b0444efba0d0aaae1e7f

  • SSDEEP

    24576:YyTZ9r21LO+fvvnR0RezSzOSrH83QGijYanjk3:fl9m6czSqyccfn

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.122:19062

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Targets

    • Target

      d0f36a35fb56545996e73a8c4fb3aba997433f6fc04bd52e8a842836b4bc89a0

    • Size

      1.0MB

    • MD5

      d1a9376ee30e36bcaf265e013a6825e6

    • SHA1

      1f64482685594803ed624a433ddae88d0aac2c76

    • SHA256

      d0f36a35fb56545996e73a8c4fb3aba997433f6fc04bd52e8a842836b4bc89a0

    • SHA512

      dc2b14f775c650bd6a3faff5d0633ec432a4e0db1c1bee1499e4ca983489e09dfba42c7078421a327ceac2947097e3cb8ecedd2bc312b0444efba0d0aaae1e7f

    • SSDEEP

      24576:YyTZ9r21LO+fvvnR0RezSzOSrH83QGijYanjk3:fl9m6czSqyccfn

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks