General

  • Target

    b47b381b7a5f551b7cfb62199b046420d5a3a1636f4893a87d1d5ace0d92ad39

  • Size

    981KB

  • Sample

    230525-aymwaafh4z

  • MD5

    f0c6811c62766421c4c431ce213d5761

  • SHA1

    5a05c76ba9c25a6e12355d514adb103064717dad

  • SHA256

    b47b381b7a5f551b7cfb62199b046420d5a3a1636f4893a87d1d5ace0d92ad39

  • SHA512

    03abd5ce99b72678712ac5abf64e9cc3e58184db4d822025d7250656961d52a7a24bdcc3166b0541e646dbb56f66a488733f39abf338cae7b3823254808f281e

  • SSDEEP

    24576:/ylSKw/23guy7FGR+TGoqhn7pyI3LFqkfUNC7:KniuERGIGdhn7pJ3MdC

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.122:19062

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Extracted

Family

redline

Botnet

haval

C2

83.97.73.122:19062

Attributes
  • auth_value

    d23dec6813deb04eb8abd82657a9b0af

Targets

    • Target

      b47b381b7a5f551b7cfb62199b046420d5a3a1636f4893a87d1d5ace0d92ad39

    • Size

      981KB

    • MD5

      f0c6811c62766421c4c431ce213d5761

    • SHA1

      5a05c76ba9c25a6e12355d514adb103064717dad

    • SHA256

      b47b381b7a5f551b7cfb62199b046420d5a3a1636f4893a87d1d5ace0d92ad39

    • SHA512

      03abd5ce99b72678712ac5abf64e9cc3e58184db4d822025d7250656961d52a7a24bdcc3166b0541e646dbb56f66a488733f39abf338cae7b3823254808f281e

    • SSDEEP

      24576:/ylSKw/23guy7FGR+TGoqhn7pyI3LFqkfUNC7:KniuERGIGdhn7pJ3MdC

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks