General

  • Target

    efd95a0970f055a6b3df0e1a61aa025a32f6dbea7b8ca8bd4a39c7a6b065d05f

  • Size

    1.0MB

  • Sample

    230525-p8zedsac44

  • MD5

    652ac3fc627354ff5cc6d2017e428c5e

  • SHA1

    d80a29ea73de2f9d61ffd857aaca71d9e0c86d0a

  • SHA256

    efd95a0970f055a6b3df0e1a61aa025a32f6dbea7b8ca8bd4a39c7a6b065d05f

  • SHA512

    774c49d07bbb1c5ab36b1a1d091af042fa730b33f2ba3719a83cea99ab479d6e4e2cae38a6189e842a76bea01d4c6ea4ea19fd945776c509d23f7c3b58a1592e

  • SSDEEP

    24576:+yGOTFSS1woUf8rKmDpjd5sBvy8GOUGGBTnDgY5G+0cfJoeq:NGOTFSuy8rKSjdiBvjUGGBTnc2G8

Malware Config

Extracted

Family

redline

Botnet

mina

C2

83.97.73.122:19062

Attributes
  • auth_value

    3d04bf4b8ba2a11c4dcf9df0e388fa05

Extracted

Family

redline

Botnet

fash

C2

83.97.73.122:19062

Attributes
  • auth_value

    dd7165bcd22b0ed3df426d944e12f136

Targets

    • Target

      efd95a0970f055a6b3df0e1a61aa025a32f6dbea7b8ca8bd4a39c7a6b065d05f

    • Size

      1.0MB

    • MD5

      652ac3fc627354ff5cc6d2017e428c5e

    • SHA1

      d80a29ea73de2f9d61ffd857aaca71d9e0c86d0a

    • SHA256

      efd95a0970f055a6b3df0e1a61aa025a32f6dbea7b8ca8bd4a39c7a6b065d05f

    • SHA512

      774c49d07bbb1c5ab36b1a1d091af042fa730b33f2ba3719a83cea99ab479d6e4e2cae38a6189e842a76bea01d4c6ea4ea19fd945776c509d23f7c3b58a1592e

    • SSDEEP

      24576:+yGOTFSS1woUf8rKmDpjd5sBvy8GOUGGBTnDgY5G+0cfJoeq:NGOTFSuy8rKSjdiBvjUGGBTnc2G8

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks