General

  • Target

    a7580c3b637b6f943cd6cb320e025353.bin

  • Size

    986KB

  • Sample

    230525-b5j9eagb5s

  • MD5

    cffda98b65f3af6767de7fd39b520d5e

  • SHA1

    4ef93c4b660eeb5426bcf483e54f625bd1f9d9ca

  • SHA256

    2f4e77436c8abbd27320f3bdf7e8122e4cdafe1b0a67ec96b9ea0571ae39f221

  • SHA512

    7e9d9f4e05221745c26689c28ee3b4756f2a45710bcf406e647eb24325efaeb5aee6dd884f64764074b06481e1ce59cf0d880d35cffb331249660714b000f28c

  • SSDEEP

    24576:Pz2fETHNjbX3wpG0S4fDzAA8IOj0Kkzi9HXDpRWRaWA0wy:Pz2AHtXwlBt209i9HXDpRWwWA0wy

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.122:19062

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      bc6427c3a0718dca2938a10770e736ae7c56423f4a93682270fb5780e2281a84.exe

    • Size

      1.0MB

    • MD5

      a7580c3b637b6f943cd6cb320e025353

    • SHA1

      10cfe691651148d4533a9eac9113be7c4a72e09e

    • SHA256

      bc6427c3a0718dca2938a10770e736ae7c56423f4a93682270fb5780e2281a84

    • SHA512

      edaec164687aab03bd039a191eedc06aa496d823c042f452212e1a97d273204f298a30efa0d69b8aa7b9e2ae24edd1ffe3412a8305a2db6d0d3b2837304a358c

    • SSDEEP

      24576:hyOnYg8TbomV77vPOxoNbT/p9sBIO1QAa9cgIJ:UOYnbTVXOxoNbTp9IfmVc5

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks