General

  • Target

    f2beedbc00beaec88da2da697eb0a6123f1b47daa79f5f754a50d3d8d4f6fa35

  • Size

    768KB

  • Sample

    230525-1l6qqsce57

  • MD5

    41a3ad8444afc14c01d2346e18e56449

  • SHA1

    75bf21bdb682c78faaeba098b1d550e4261528fd

  • SHA256

    f2beedbc00beaec88da2da697eb0a6123f1b47daa79f5f754a50d3d8d4f6fa35

  • SHA512

    b428b62216c47721fb0b9b12caa3589f97d02c057c02edbb7af53f8c5e9f5a4379ab3edae388b6c375b61cf5e736907078d698eee18d4ab7efd89aaafafc69e0

  • SSDEEP

    12288:8MrHy90UfGaRgJbCaQ/XUhwY37i+ZFaPAVfcjiKCyJYbHYYTOQ5Fn0kBisnMLtIX:Dyzf4R9QfUhwY3/ZMAVfcjiKCy8T3L0a

Malware Config

Extracted

Family

redline

Botnet

dina

C2

83.97.73.122:19062

Attributes
  • auth_value

    4f77073adc624269de1bff760b9bc471

Extracted

Family

redline

Botnet

greg

C2

83.97.73.122:19062

Attributes
  • auth_value

    4c966a90781c6b4ab7f512d018696362

Targets

    • Target

      f2beedbc00beaec88da2da697eb0a6123f1b47daa79f5f754a50d3d8d4f6fa35

    • Size

      768KB

    • MD5

      41a3ad8444afc14c01d2346e18e56449

    • SHA1

      75bf21bdb682c78faaeba098b1d550e4261528fd

    • SHA256

      f2beedbc00beaec88da2da697eb0a6123f1b47daa79f5f754a50d3d8d4f6fa35

    • SHA512

      b428b62216c47721fb0b9b12caa3589f97d02c057c02edbb7af53f8c5e9f5a4379ab3edae388b6c375b61cf5e736907078d698eee18d4ab7efd89aaafafc69e0

    • SSDEEP

      12288:8MrHy90UfGaRgJbCaQ/XUhwY37i+ZFaPAVfcjiKCyJYbHYYTOQ5Fn0kBisnMLtIX:Dyzf4R9QfUhwY3/ZMAVfcjiKCy8T3L0a

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks