General

  • Target

    70bd7744e3e78ad2eb985703b9daa2877f8ff3d4585b45aa01cb7583f5e79644

  • Size

    770KB

  • Sample

    230526-22ykqshe53

  • MD5

    91b0a7e8e78d62081b4b33a5e2b2046e

  • SHA1

    f3429dcc1436208873e729e01b145a45771357bc

  • SHA256

    70bd7744e3e78ad2eb985703b9daa2877f8ff3d4585b45aa01cb7583f5e79644

  • SHA512

    283b43b4a3b3df32d352d03906ba38e6ed606489e2cb04c6f2ed6a535e2cf7ad52da79fc741d69d9ced1dee45d4b09d4a6c6bdf6f0851d82ee4af80e57c48dcc

  • SSDEEP

    24576:Uy7Nq2N+DmvcDCtV1Rb5wJ1f03h0CJbfj8:j7Ek+CvcDC3bGJpSNxf

Malware Config

Extracted

Family

redline

Botnet

disa

C2

83.97.73.122:19062

Attributes
  • auth_value

    93f8c4ca7000e3381dd4b6b86434de05

Extracted

Family

redline

Botnet

goga

C2

83.97.73.122:19062

Attributes
  • auth_value

    6d57dff6d3c42dddb8a76dc276b8467f

Targets

    • Target

      70bd7744e3e78ad2eb985703b9daa2877f8ff3d4585b45aa01cb7583f5e79644

    • Size

      770KB

    • MD5

      91b0a7e8e78d62081b4b33a5e2b2046e

    • SHA1

      f3429dcc1436208873e729e01b145a45771357bc

    • SHA256

      70bd7744e3e78ad2eb985703b9daa2877f8ff3d4585b45aa01cb7583f5e79644

    • SHA512

      283b43b4a3b3df32d352d03906ba38e6ed606489e2cb04c6f2ed6a535e2cf7ad52da79fc741d69d9ced1dee45d4b09d4a6c6bdf6f0851d82ee4af80e57c48dcc

    • SSDEEP

      24576:Uy7Nq2N+DmvcDCtV1Rb5wJ1f03h0CJbfj8:j7Ek+CvcDC3bGJpSNxf

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

2
T1112

Disabling Security Tools

1
T1089

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks