General

  • Target

    aa0d39a80b5b788ed8b6abc8fbcc02a93fce8d4aac906e5ce6f6b9f7813b6a82

  • Size

    982KB

  • Sample

    230525-d3qdrafh74

  • MD5

    c66c8b8bfe14454f33d262e373f96c4e

  • SHA1

    29b84c3e398b74b22c5d6459873e388b6100f095

  • SHA256

    aa0d39a80b5b788ed8b6abc8fbcc02a93fce8d4aac906e5ce6f6b9f7813b6a82

  • SHA512

    fbff9421db5ea21445fcd49f1851d9e7be53ea9faed6a7cfd2e0a28df11eff4ad3137b4251a187b82e00040c8268fb63efe010ae30d8e6c8c124b511b0aaea15

  • SSDEEP

    24576:ByjoeFjxTJ77ovaUpvyralP7TGP9hpOcLFzkfnC:0rFjxTx7oxyQnG1hpOcJ

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.122:19062

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Extracted

Family

redline

Botnet

haval

C2

83.97.73.122:19062

Attributes
  • auth_value

    d23dec6813deb04eb8abd82657a9b0af

Targets

    • Target

      aa0d39a80b5b788ed8b6abc8fbcc02a93fce8d4aac906e5ce6f6b9f7813b6a82

    • Size

      982KB

    • MD5

      c66c8b8bfe14454f33d262e373f96c4e

    • SHA1

      29b84c3e398b74b22c5d6459873e388b6100f095

    • SHA256

      aa0d39a80b5b788ed8b6abc8fbcc02a93fce8d4aac906e5ce6f6b9f7813b6a82

    • SHA512

      fbff9421db5ea21445fcd49f1851d9e7be53ea9faed6a7cfd2e0a28df11eff4ad3137b4251a187b82e00040c8268fb63efe010ae30d8e6c8c124b511b0aaea15

    • SSDEEP

      24576:ByjoeFjxTJ77ovaUpvyralP7TGP9hpOcLFzkfnC:0rFjxTx7oxyQnG1hpOcJ

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks