General

  • Target

    e9975e4cb5d9e14d9214519081ac42ed.bin

  • Size

    985KB

  • Sample

    230525-ccrcpafg45

  • MD5

    acac9eaa0ffc43621885fc0c65cc1d8f

  • SHA1

    bbd8a56401a3b85ff7475a0dc44bde68572c6b16

  • SHA256

    d6d17bf262ec81e5456f489d54c797bb840f16dd14fc0fa2a59c72c2b9df9c97

  • SHA512

    b8ac38553b440a358532944c3b4a81583cd24772ae9da587ccf56441f78119d2963f5011b3c678b3db367bf7c9687feba935ee2a40a49cf6eee638e864f8255a

  • SSDEEP

    24576:a7mYgNfGLZjnjV2z5J+9iz1oGfheOExAa5:a7mYg5YZjj6J+9i1peOMF

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.122:19062

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Targets

    • Target

      26d54d9d2c8d2cb62e461f7371862c48b44c63cb03f4b5471df274514acbbc8b.exe

    • Size

      1.0MB

    • MD5

      e9975e4cb5d9e14d9214519081ac42ed

    • SHA1

      965697a244c959e39b99b782af20a543b4c3ee2d

    • SHA256

      26d54d9d2c8d2cb62e461f7371862c48b44c63cb03f4b5471df274514acbbc8b

    • SHA512

      8e91c85b89f6c54a87fe74afd30408abe59ff59c00172805c0e99b7aeb7b5f5334463e71ba81b925ec9da2012cc868dade2f3b2a00c9c26c4d037523f2cc3622

    • SSDEEP

      24576:oypw69GHGNrvHfgWpbEp29Kdc6D1c9fTG43R5:vpZGHo0rf12X3R

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks