General

  • Target

    989c5afc5facb621f0fb881e66b7302bc1025068182db702046887b75a3a34c3

  • Size

    767KB

  • Sample

    230525-xlxlaabg98

  • MD5

    3e04921009ac79e49d76e4fef9e5242b

  • SHA1

    c5bcc21e825fe0aea60d4428bbb9ef1c120c0c49

  • SHA256

    989c5afc5facb621f0fb881e66b7302bc1025068182db702046887b75a3a34c3

  • SHA512

    1ee1f72afc36e3b68277ec930a82b1be3c17c5fcaa71dd51043a10b89879996116b39f1e35fba3663fe2c3ca3566f85168e318b7fa922c28b42db4369d32934d

  • SSDEEP

    12288:fMrYy90CHvPTJ8dgJkAQCa4t/HNf6ZJ6KMQ1pegVrNXwPsg4ZWSkBsXnMMtIW+XT:/y3mdgJkgaMHNCZJdMqeYwP/4ZdkiXMh

Malware Config

Extracted

Family

redline

Botnet

dina

C2

83.97.73.122:19062

Attributes
  • auth_value

    4f77073adc624269de1bff760b9bc471

Extracted

Family

redline

Botnet

greg

C2

83.97.73.122:19062

Attributes
  • auth_value

    4c966a90781c6b4ab7f512d018696362

Targets

    • Target

      989c5afc5facb621f0fb881e66b7302bc1025068182db702046887b75a3a34c3

    • Size

      767KB

    • MD5

      3e04921009ac79e49d76e4fef9e5242b

    • SHA1

      c5bcc21e825fe0aea60d4428bbb9ef1c120c0c49

    • SHA256

      989c5afc5facb621f0fb881e66b7302bc1025068182db702046887b75a3a34c3

    • SHA512

      1ee1f72afc36e3b68277ec930a82b1be3c17c5fcaa71dd51043a10b89879996116b39f1e35fba3663fe2c3ca3566f85168e318b7fa922c28b42db4369d32934d

    • SSDEEP

      12288:fMrYy90CHvPTJ8dgJkAQCa4t/HNf6ZJ6KMQ1pegVrNXwPsg4ZWSkBsXnMMtIW+XT:/y3mdgJkgaMHNCZJdMqeYwP/4ZdkiXMh

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks