General

  • Target

    47f433471adf8c2637b9f3203aa3484fd0ec329f30fb36442293a6956823f7bc

  • Size

    1.0MB

  • Sample

    230525-q3y24sae75

  • MD5

    e34f726d176bd49a0283351fc6c0c076

  • SHA1

    2c1e1ea2e9d34643d21229f5a94ee2ddfc2160bb

  • SHA256

    47f433471adf8c2637b9f3203aa3484fd0ec329f30fb36442293a6956823f7bc

  • SHA512

    9f03363767115eedbef905c0cf072dac371f8688121d345e4977ca946ff719cbcb27737aa5b68c4f33459bb9cdc4f6a31bba7bcde859b05d226723399be40ce3

  • SSDEEP

    12288:7Mrvy90YpTrPWItHEDO7qxW6Vcbzgo1y7aH3tAjOzCD8qx97UYub1z9qWfcoaWNO:QyvpPDHEDO5wEqOCZ94zqRMo0pfBE7

Malware Config

Extracted

Family

redline

Botnet

dina

C2

83.97.73.122:19062

Attributes
  • auth_value

    4f77073adc624269de1bff760b9bc471

Extracted

Family

redline

Botnet

fash

C2

83.97.73.122:19062

Attributes
  • auth_value

    dd7165bcd22b0ed3df426d944e12f136

Targets

    • Target

      47f433471adf8c2637b9f3203aa3484fd0ec329f30fb36442293a6956823f7bc

    • Size

      1.0MB

    • MD5

      e34f726d176bd49a0283351fc6c0c076

    • SHA1

      2c1e1ea2e9d34643d21229f5a94ee2ddfc2160bb

    • SHA256

      47f433471adf8c2637b9f3203aa3484fd0ec329f30fb36442293a6956823f7bc

    • SHA512

      9f03363767115eedbef905c0cf072dac371f8688121d345e4977ca946ff719cbcb27737aa5b68c4f33459bb9cdc4f6a31bba7bcde859b05d226723399be40ce3

    • SSDEEP

      12288:7Mrvy90YpTrPWItHEDO7qxW6Vcbzgo1y7aH3tAjOzCD8qx97UYub1z9qWfcoaWNO:QyvpPDHEDO5wEqOCZ94zqRMo0pfBE7

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks