General

  • Target

    cfb1e66c47e4d24735a66b05e89d1f0292fd359c1a86fd52492a0376d80fd47a

  • Size

    983KB

  • Sample

    230524-2166gsff31

  • MD5

    10eb47dae5ef96cd4adfe6054b321cba

  • SHA1

    e88960ba5b64efc62f3402243e2e010dcd5f0bd1

  • SHA256

    cfb1e66c47e4d24735a66b05e89d1f0292fd359c1a86fd52492a0376d80fd47a

  • SHA512

    e015dc3557fb4af9b08143afbd1b54f321adecc2ff486a53a15dd7f34d6b0b94df87cbcc1d2754818bfaf07b6392258bc60fec0fad0304f71909f2be57fd3787

  • SSDEEP

    24576:synInjxbnFGBbZnRnWmsTEwwT5gIhjpEjpLAiPfStWK1+W8:bInjxbFkrnWDTED5ThFEVO8Kh

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.122:19062

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Extracted

Family

redline

Botnet

ebal

C2

83.97.73.122:19062

Attributes
  • auth_value

    adedb0785152892650ba0123aadb727d

Targets

    • Target

      cfb1e66c47e4d24735a66b05e89d1f0292fd359c1a86fd52492a0376d80fd47a

    • Size

      983KB

    • MD5

      10eb47dae5ef96cd4adfe6054b321cba

    • SHA1

      e88960ba5b64efc62f3402243e2e010dcd5f0bd1

    • SHA256

      cfb1e66c47e4d24735a66b05e89d1f0292fd359c1a86fd52492a0376d80fd47a

    • SHA512

      e015dc3557fb4af9b08143afbd1b54f321adecc2ff486a53a15dd7f34d6b0b94df87cbcc1d2754818bfaf07b6392258bc60fec0fad0304f71909f2be57fd3787

    • SSDEEP

      24576:synInjxbnFGBbZnRnWmsTEwwT5gIhjpEjpLAiPfStWK1+W8:bInjxbFkrnWDTED5ThFEVO8Kh

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks