General

  • Target

    c45bf3ac00b9bedd17ba4451505418c9cd9a4a4c0fedb05fd0c6ff5e5c986691

  • Size

    873KB

  • Sample

    230524-mnn2taca72

  • MD5

    411ac0f57eb2a4e6ea5024a856341983

  • SHA1

    eb91be811a35d87f83c53bebf85be31ea50e8e04

  • SHA256

    c45bf3ac00b9bedd17ba4451505418c9cd9a4a4c0fedb05fd0c6ff5e5c986691

  • SHA512

    2e8efcdc5c56f3d0ad254bfd81f6caa8058f1ed432172eed71d24b1a6b6994790cfb439038a1bd13fb83d6babbea9df57a8d9fa348b7a1dc6563e384fbaf624f

  • SSDEEP

    12288:0Mriwy90EkgZ3Rn8w9huAMD4iSBVhu4RpJ9GMVaCbd1segRRptUmfQb9DmOKKs:dyE8lM0vpJ99oXtV65mP

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.122:19062

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Extracted

Family

redline

Botnet

mesu

C2

83.97.73.122:19062

Attributes
  • auth_value

    8ede6a157d1d9509a21427d10e999ba2

Targets

    • Target

      c45bf3ac00b9bedd17ba4451505418c9cd9a4a4c0fedb05fd0c6ff5e5c986691

    • Size

      873KB

    • MD5

      411ac0f57eb2a4e6ea5024a856341983

    • SHA1

      eb91be811a35d87f83c53bebf85be31ea50e8e04

    • SHA256

      c45bf3ac00b9bedd17ba4451505418c9cd9a4a4c0fedb05fd0c6ff5e5c986691

    • SHA512

      2e8efcdc5c56f3d0ad254bfd81f6caa8058f1ed432172eed71d24b1a6b6994790cfb439038a1bd13fb83d6babbea9df57a8d9fa348b7a1dc6563e384fbaf624f

    • SSDEEP

      12288:0Mriwy90EkgZ3Rn8w9huAMD4iSBVhu4RpJ9GMVaCbd1segRRptUmfQb9DmOKKs:dyE8lM0vpJ99oXtV65mP

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks