General

  • Target

    4f1d35db4ab17bc9dc126114ec347131776c76e9ee975c2851485aaeebc17504

  • Size

    767KB

  • Sample

    230525-3sbkaadf3y

  • MD5

    d18878a5435ee53450549be50879733d

  • SHA1

    caeaa92ac4f5e8730acb5db838550a9fb4497ca9

  • SHA256

    4f1d35db4ab17bc9dc126114ec347131776c76e9ee975c2851485aaeebc17504

  • SHA512

    2922d044eefc5580115d55c22bb848883cfd5dfa03903038ac8bd6e0c00868ffc67c6cf6f7b3f667a94d73d012ee52abcc2498612fa0512ccba920772b64b638

  • SSDEEP

    12288:2MrNy90AVSQICR8YYZ7A6Jr0MC43SPsOfOkx4y8tZmbwn0kBHVnMLtIW+gEWZQ:PyPiCR8YyAiryESUix4y8tZ0w0kxVML2

Malware Config

Extracted

Family

redline

Botnet

dina

C2

83.97.73.122:19062

Attributes
  • auth_value

    4f77073adc624269de1bff760b9bc471

Extracted

Family

redline

Botnet

greg

C2

83.97.73.122:19062

Attributes
  • auth_value

    4c966a90781c6b4ab7f512d018696362

Targets

    • Target

      4f1d35db4ab17bc9dc126114ec347131776c76e9ee975c2851485aaeebc17504

    • Size

      767KB

    • MD5

      d18878a5435ee53450549be50879733d

    • SHA1

      caeaa92ac4f5e8730acb5db838550a9fb4497ca9

    • SHA256

      4f1d35db4ab17bc9dc126114ec347131776c76e9ee975c2851485aaeebc17504

    • SHA512

      2922d044eefc5580115d55c22bb848883cfd5dfa03903038ac8bd6e0c00868ffc67c6cf6f7b3f667a94d73d012ee52abcc2498612fa0512ccba920772b64b638

    • SSDEEP

      12288:2MrNy90AVSQICR8YYZ7A6Jr0MC43SPsOfOkx4y8tZmbwn0kBHVnMLtIW+gEWZQ:PyPiCR8YyAiryESUix4y8tZ0w0kxVML2

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks