General

  • Target

    7ab3f7ed303e1dbe1ed4140643270974532289de2bd7d6c17d4591192513c094

  • Size

    1.0MB

  • Sample

    230525-n7v5xaac4t

  • MD5

    fbfbf40b69c159ac9e2e3bf7ac3da27a

  • SHA1

    a9634dc8611161ee42f671e135a12f47af8ed417

  • SHA256

    7ab3f7ed303e1dbe1ed4140643270974532289de2bd7d6c17d4591192513c094

  • SHA512

    dfed99602a17180b0709be48a62a27aa2bf246b7dd84983f842abc5cdc61b4c3e39976472bc5aec824a70c37f66e94ac636d92c50b1010886defe6ec7b67ae49

  • SSDEEP

    24576:7ydIvq9l/c3iVW52u/g7BYVNTptc2+jc0rf9qGP:udl7vW52LYVNTptcjjn

Malware Config

Extracted

Family

redline

Botnet

dina

C2

83.97.73.122:19062

Attributes
  • auth_value

    4f77073adc624269de1bff760b9bc471

Extracted

Family

redline

Botnet

fash

C2

83.97.73.122:19062

Attributes
  • auth_value

    dd7165bcd22b0ed3df426d944e12f136

Targets

    • Target

      7ab3f7ed303e1dbe1ed4140643270974532289de2bd7d6c17d4591192513c094

    • Size

      1.0MB

    • MD5

      fbfbf40b69c159ac9e2e3bf7ac3da27a

    • SHA1

      a9634dc8611161ee42f671e135a12f47af8ed417

    • SHA256

      7ab3f7ed303e1dbe1ed4140643270974532289de2bd7d6c17d4591192513c094

    • SHA512

      dfed99602a17180b0709be48a62a27aa2bf246b7dd84983f842abc5cdc61b4c3e39976472bc5aec824a70c37f66e94ac636d92c50b1010886defe6ec7b67ae49

    • SSDEEP

      24576:7ydIvq9l/c3iVW52u/g7BYVNTptc2+jc0rf9qGP:udl7vW52LYVNTptcjjn

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks