General

  • Target

    024ee2e42a0cb9a95b7e127b10c17fbe61dbfaf1250399f00255774a05fff26a

  • Size

    982KB

  • Sample

    230525-h74t6aha9t

  • MD5

    ded9c446b66d152a59e897c3a382d0d3

  • SHA1

    9c9f3186eb258527e568b3f55507859ffd16dd09

  • SHA256

    024ee2e42a0cb9a95b7e127b10c17fbe61dbfaf1250399f00255774a05fff26a

  • SHA512

    5684a34c1c083d7b9cae293b01f08b30cf50ccd4bd0d056e33f6af5e308644eef16c27a07154afcae21032075697acc65730776a382c34f2060ed1babe5a859e

  • SSDEEP

    24576:2y85HLYyqQ8Q87qAinTGYbhfIkLFbkfKFnLJ:F6rYDhqrGghfXxr

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.122:19062

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Extracted

Family

redline

Botnet

haval

C2

83.97.73.122:19062

Attributes
  • auth_value

    d23dec6813deb04eb8abd82657a9b0af

Targets

    • Target

      024ee2e42a0cb9a95b7e127b10c17fbe61dbfaf1250399f00255774a05fff26a

    • Size

      982KB

    • MD5

      ded9c446b66d152a59e897c3a382d0d3

    • SHA1

      9c9f3186eb258527e568b3f55507859ffd16dd09

    • SHA256

      024ee2e42a0cb9a95b7e127b10c17fbe61dbfaf1250399f00255774a05fff26a

    • SHA512

      5684a34c1c083d7b9cae293b01f08b30cf50ccd4bd0d056e33f6af5e308644eef16c27a07154afcae21032075697acc65730776a382c34f2060ed1babe5a859e

    • SSDEEP

      24576:2y85HLYyqQ8Q87qAinTGYbhfIkLFbkfKFnLJ:F6rYDhqrGghfXxr

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks