General

  • Target

    196ebc0c8d75fc3383d819d599d78278c93712cb5395b3eb34a71eddb85db468

  • Size

    768KB

  • Sample

    230525-y24j7scb89

  • MD5

    9bfefeaddca9bafaf994e71c68018d43

  • SHA1

    38adced02d24e2b0bed378db114d869485a46391

  • SHA256

    196ebc0c8d75fc3383d819d599d78278c93712cb5395b3eb34a71eddb85db468

  • SHA512

    583c56b94e22bdaee3ed7512e434dff982cc726ebd3547bc2aba9e153e564420bd028edb5f7be6a580a33a6522b6b63775ba6a984252560ec9a8540fbd05e400

  • SSDEEP

    12288:HMrty903PlYjVrqIr7afWbzTmrhYQjY/wltwjWX006Nq77WSkBT+nMMtIW+QE4L2:KySlYjVrqU2fI/0hYQc/wwCE06MndkhT

Malware Config

Extracted

Family

redline

Botnet

dina

C2

83.97.73.122:19062

Attributes
  • auth_value

    4f77073adc624269de1bff760b9bc471

Extracted

Family

redline

Botnet

greg

C2

83.97.73.122:19062

Attributes
  • auth_value

    4c966a90781c6b4ab7f512d018696362

Targets

    • Target

      196ebc0c8d75fc3383d819d599d78278c93712cb5395b3eb34a71eddb85db468

    • Size

      768KB

    • MD5

      9bfefeaddca9bafaf994e71c68018d43

    • SHA1

      38adced02d24e2b0bed378db114d869485a46391

    • SHA256

      196ebc0c8d75fc3383d819d599d78278c93712cb5395b3eb34a71eddb85db468

    • SHA512

      583c56b94e22bdaee3ed7512e434dff982cc726ebd3547bc2aba9e153e564420bd028edb5f7be6a580a33a6522b6b63775ba6a984252560ec9a8540fbd05e400

    • SSDEEP

      12288:HMrty903PlYjVrqIr7afWbzTmrhYQjY/wltwjWX006Nq77WSkBT+nMMtIW+QE4L2:KySlYjVrqU2fI/0hYQc/wwCE06MndkhT

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks