General

  • Target

    692ab556ede0812c52c5bd2cf3ab10641de1130922594ae7e432ae69cd7ca10c

  • Size

    1.0MB

  • Sample

    230526-bpflaadb97

  • MD5

    69af6a852f664e86314d914c49a9ac52

  • SHA1

    b9053cf4bdffaae7a7bb043f50d341edc7c6038b

  • SHA256

    692ab556ede0812c52c5bd2cf3ab10641de1130922594ae7e432ae69cd7ca10c

  • SHA512

    902a64a76368d136edf0c10bf3da231e9594853edc55d1d12a4dda1e2c01b024ab8f6f8656b3c9453eec943fe48781c73155362e228b73bc12c5e7a71026f9e7

  • SSDEEP

    24576:yy/IT3jtz3wZeAsQ1Nzdb9ZE2kqEM6N+C2y1lVNzvuWDT/7dBJWa:ZU3jx3q1NxbPEEEM6N+6lVosdBJ

Malware Config

Extracted

Family

redline

Botnet

lina

C2

83.97.73.122:19062

Attributes
  • auth_value

    13523aee5d194d7716b22eeab7de10ad

Extracted

Family

redline

Botnet

greg

C2

83.97.73.122:19062

Attributes
  • auth_value

    4c966a90781c6b4ab7f512d018696362

Targets

    • Target

      692ab556ede0812c52c5bd2cf3ab10641de1130922594ae7e432ae69cd7ca10c

    • Size

      1.0MB

    • MD5

      69af6a852f664e86314d914c49a9ac52

    • SHA1

      b9053cf4bdffaae7a7bb043f50d341edc7c6038b

    • SHA256

      692ab556ede0812c52c5bd2cf3ab10641de1130922594ae7e432ae69cd7ca10c

    • SHA512

      902a64a76368d136edf0c10bf3da231e9594853edc55d1d12a4dda1e2c01b024ab8f6f8656b3c9453eec943fe48781c73155362e228b73bc12c5e7a71026f9e7

    • SSDEEP

      24576:yy/IT3jtz3wZeAsQ1Nzdb9ZE2kqEM6N+C2y1lVNzvuWDT/7dBJWa:ZU3jx3q1NxbPEEEM6N+6lVosdBJ

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks