General

  • Target

    15a658cbed3f501cb218fb975957f768ea912051633e7fdfc70046ecac1a2d43

  • Size

    768KB

  • Sample

    230525-1dbwdsce28

  • MD5

    27f020402be7f0b6e38cdeca271420a0

  • SHA1

    11c3c328657e5e14ed2f4f56b4b30731dfc568b9

  • SHA256

    15a658cbed3f501cb218fb975957f768ea912051633e7fdfc70046ecac1a2d43

  • SHA512

    b63b2a8c20c4119c8998f91cd007d724eed80bf1b9b1625e3ff1491f3de66cf558e99900f57be5f25ad447f0b990d1220d7d376708da5ba3b7f61fa5368da1e2

  • SSDEEP

    12288:UMrOy90JiKsMHd8BOw0/rskqzQBl05gmHyVTZIYNoYCSiWSkB0jnMMtIW+PEozgd:iy8NHd80/rskmQ0NwTZMNdkqjMM1+50d

Malware Config

Extracted

Family

redline

Botnet

dina

C2

83.97.73.122:19062

Attributes
  • auth_value

    4f77073adc624269de1bff760b9bc471

Extracted

Family

redline

Botnet

greg

C2

83.97.73.122:19062

Attributes
  • auth_value

    4c966a90781c6b4ab7f512d018696362

Targets

    • Target

      15a658cbed3f501cb218fb975957f768ea912051633e7fdfc70046ecac1a2d43

    • Size

      768KB

    • MD5

      27f020402be7f0b6e38cdeca271420a0

    • SHA1

      11c3c328657e5e14ed2f4f56b4b30731dfc568b9

    • SHA256

      15a658cbed3f501cb218fb975957f768ea912051633e7fdfc70046ecac1a2d43

    • SHA512

      b63b2a8c20c4119c8998f91cd007d724eed80bf1b9b1625e3ff1491f3de66cf558e99900f57be5f25ad447f0b990d1220d7d376708da5ba3b7f61fa5368da1e2

    • SSDEEP

      12288:UMrOy90JiKsMHd8BOw0/rskqzQBl05gmHyVTZIYNoYCSiWSkB0jnMMtIW+PEozgd:iy8NHd80/rskmQ0NwTZMNdkqjMM1+50d

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks