General

  • Target

    49bcaef192e18fba9838fed854e85ec17b143b1f298efd934afb9d6cd24cf7ae

  • Size

    985KB

  • Sample

    230525-f9zl4sgf6v

  • MD5

    98509b7e514f1a146978b21df2926168

  • SHA1

    1149e23d6ed002b38ea9fbf9c4870066e1bc5507

  • SHA256

    49bcaef192e18fba9838fed854e85ec17b143b1f298efd934afb9d6cd24cf7ae

  • SHA512

    5b066bafa33c643d6f7d9b66210026cb6356bb9a12f65340f2fcdbe99268450b3f7d3b74e27674956bf017863fa5d96d19ed9e18ea4d6e1254e2bc544bb3c175

  • SSDEEP

    24576:qyPXYeCh2czRHigpFIkfLGDJcOSxP+VVxq0:xPIeChzVHigQ/UP+Rq

Malware Config

Extracted

Family

redline

Botnet

lupa

C2

83.97.73.122:19062

Attributes
  • auth_value

    6a764aa41830c77712442516d143bc9c

Extracted

Family

redline

Botnet

haval

C2

83.97.73.122:19062

Attributes
  • auth_value

    d23dec6813deb04eb8abd82657a9b0af

Targets

    • Target

      49bcaef192e18fba9838fed854e85ec17b143b1f298efd934afb9d6cd24cf7ae

    • Size

      985KB

    • MD5

      98509b7e514f1a146978b21df2926168

    • SHA1

      1149e23d6ed002b38ea9fbf9c4870066e1bc5507

    • SHA256

      49bcaef192e18fba9838fed854e85ec17b143b1f298efd934afb9d6cd24cf7ae

    • SHA512

      5b066bafa33c643d6f7d9b66210026cb6356bb9a12f65340f2fcdbe99268450b3f7d3b74e27674956bf017863fa5d96d19ed9e18ea4d6e1254e2bc544bb3c175

    • SSDEEP

      24576:qyPXYeCh2czRHigpFIkfLGDJcOSxP+VVxq0:xPIeChzVHigQ/UP+Rq

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks