General

  • Target

    d3c1f79bd46ee4ac7d6946062e9080c197875bf665eb1323abf40768983ae9df

  • Size

    767KB

  • Sample

    230526-c94z2sde44

  • MD5

    13cfc01dec8cf32d264662197ad8e378

  • SHA1

    aea740c5981485b2b0ab5a3fe715b4995610ea11

  • SHA256

    d3c1f79bd46ee4ac7d6946062e9080c197875bf665eb1323abf40768983ae9df

  • SHA512

    73c3e0a1ff24028594445bacfb2c185ecebf38d25d0182176f35bc012740b25a2029aec5a908d55aac9510f2c27ac4f09ab2ddb57430569d0640b342f24a5df8

  • SSDEEP

    12288:aMrNy90WFq0/OGlUdUv1fIQtnof3qxo+rNtvdvBHvGkBugnM8tIW+TE0gn6nK:vyrWuUdU1QanoPqh/ukkgM81+mN

Malware Config

Extracted

Family

redline

Botnet

dina

C2

83.97.73.122:19062

Attributes
  • auth_value

    4f77073adc624269de1bff760b9bc471

Extracted

Family

redline

Botnet

greg

C2

83.97.73.122:19062

Attributes
  • auth_value

    4c966a90781c6b4ab7f512d018696362

Targets

    • Target

      d3c1f79bd46ee4ac7d6946062e9080c197875bf665eb1323abf40768983ae9df

    • Size

      767KB

    • MD5

      13cfc01dec8cf32d264662197ad8e378

    • SHA1

      aea740c5981485b2b0ab5a3fe715b4995610ea11

    • SHA256

      d3c1f79bd46ee4ac7d6946062e9080c197875bf665eb1323abf40768983ae9df

    • SHA512

      73c3e0a1ff24028594445bacfb2c185ecebf38d25d0182176f35bc012740b25a2029aec5a908d55aac9510f2c27ac4f09ab2ddb57430569d0640b342f24a5df8

    • SSDEEP

      12288:aMrNy90WFq0/OGlUdUv1fIQtnof3qxo+rNtvdvBHvGkBugnM8tIW+TE0gn6nK:vyrWuUdU1QanoPqh/ukkgM81+mN

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks