General

  • Target

    ad7297deeb0217da6b8657774439344f.bin

  • Size

    975KB

  • Sample

    230525-b5ph5afg23

  • MD5

    aa5e8633d83efe3e5b75e617a44a8890

  • SHA1

    af79b9b5147f362630c4fd0f4d33e66d1766238c

  • SHA256

    252ab674b84bec47f9c32cf7f24b6ccea7649431faaae3d3594a5bf5931ea1d6

  • SHA512

    b82cc67dfc245cd739126a16fcb97f107e218628e1dea807012e2fb27acd8e5836cda4bf653a5e18fa6210b02c9dbcb76821c3b68cf15b34c3c589a0db840a96

  • SSDEEP

    24576:X+LGZyx6yldpfgXmyeAPDGDIkUwUCX0MldNVhUF7sdg2kHAp:X+xNdpoXNeAPDHukkdN05Z2kHAp

Malware Config

Extracted

Family

redline

Botnet

lupa

C2

83.97.73.122:19062

Attributes
  • auth_value

    6a764aa41830c77712442516d143bc9c

Targets

    • Target

      596ec02783081f039a5255feaa13d59715819b7e6a9d1880728867499f5f7897.exe

    • Size

      1020KB

    • MD5

      ad7297deeb0217da6b8657774439344f

    • SHA1

      a0b00abb3a0e635e5bc22edfa231232f5e57f711

    • SHA256

      596ec02783081f039a5255feaa13d59715819b7e6a9d1880728867499f5f7897

    • SHA512

      fc5899b37fecc2e1171b71bc613fddf864c1258b2d3130a73dd1fbb69039d5e98cba207a8a4158a9e8b79f7c3aeecefe751c8186672647e6d17f15221dd075b0

    • SSDEEP

      24576:uyHm4vPDLgA+8hmvOTYDKZow+BwwKYoiZdIR:9HZgx8PRZow+6qo4dI

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks