General

  • Target

    ce9ac8bb30bcf226928270644820a3da32f12c530869d120292e4a5ada38c522

  • Size

    982KB

  • Sample

    230525-dx1mjafh63

  • MD5

    a00de4597aae894bb3f93de4321918d0

  • SHA1

    a16daff87b73341684e5cbfc655ac2138687c61a

  • SHA256

    ce9ac8bb30bcf226928270644820a3da32f12c530869d120292e4a5ada38c522

  • SHA512

    eeb6ad06e96d8f086fad191bd1a1aaea63d35f8af9e5add4328267c36370784d93e644feb9b0cb47deffacaad3925c3c4a0dca4b655dea74334c85c740e25c88

  • SSDEEP

    24576:Cy1t+/+jhBAcByO/IN8GJwUiTTGL2hEg5LFtkfdAK:pz+/+VeOwN8a/UGChEg5D

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.122:19062

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Extracted

Family

redline

Botnet

haval

C2

83.97.73.122:19062

Attributes
  • auth_value

    d23dec6813deb04eb8abd82657a9b0af

Targets

    • Target

      ce9ac8bb30bcf226928270644820a3da32f12c530869d120292e4a5ada38c522

    • Size

      982KB

    • MD5

      a00de4597aae894bb3f93de4321918d0

    • SHA1

      a16daff87b73341684e5cbfc655ac2138687c61a

    • SHA256

      ce9ac8bb30bcf226928270644820a3da32f12c530869d120292e4a5ada38c522

    • SHA512

      eeb6ad06e96d8f086fad191bd1a1aaea63d35f8af9e5add4328267c36370784d93e644feb9b0cb47deffacaad3925c3c4a0dca4b655dea74334c85c740e25c88

    • SSDEEP

      24576:Cy1t+/+jhBAcByO/IN8GJwUiTTGL2hEg5LFtkfdAK:pz+/+VeOwN8a/UGChEg5D

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks