General

  • Target

    d22bc16db6a07de6c44a938947440a8edc438428c75777744a2d93fc636fd8c1

  • Size

    982KB

  • Sample

    230525-d9qm4afh88

  • MD5

    00c66e730bf53beda21e5df7ceb55dd9

  • SHA1

    e7d74d24bae49bbd55e01ce02b7c4a151b8e368a

  • SHA256

    d22bc16db6a07de6c44a938947440a8edc438428c75777744a2d93fc636fd8c1

  • SHA512

    7256a979ab9b5f8b910b25e725febb8220396cdc1c167666103896ab6474f75002e33ecde6f2fd7da35478d40630adb178134e657c5c34146577807360edece1

  • SSDEEP

    24576:8yw5ETraYLlr/BwkCVTGAzh9BUlte+72KEwhmK8V:rQcaSlLvAGyhceM/v8

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.122:19062

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Extracted

Family

redline

Botnet

haval

C2

83.97.73.122:19062

Attributes
  • auth_value

    d23dec6813deb04eb8abd82657a9b0af

Targets

    • Target

      d22bc16db6a07de6c44a938947440a8edc438428c75777744a2d93fc636fd8c1

    • Size

      982KB

    • MD5

      00c66e730bf53beda21e5df7ceb55dd9

    • SHA1

      e7d74d24bae49bbd55e01ce02b7c4a151b8e368a

    • SHA256

      d22bc16db6a07de6c44a938947440a8edc438428c75777744a2d93fc636fd8c1

    • SHA512

      7256a979ab9b5f8b910b25e725febb8220396cdc1c167666103896ab6474f75002e33ecde6f2fd7da35478d40630adb178134e657c5c34146577807360edece1

    • SSDEEP

      24576:8yw5ETraYLlr/BwkCVTGAzh9BUlte+72KEwhmK8V:rQcaSlLvAGyhceM/v8

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks