General

  • Target

    800307668df7bf73831585873591dafac14c1f10cd843143f0d3448a175cb04e

  • Size

    767KB

  • Sample

    230526-fc6n6adg39

  • MD5

    ffe8a990d459d93dea0b29d143e98b7f

  • SHA1

    be0ce679df869993557f7bc129aa194e6ce7a370

  • SHA256

    800307668df7bf73831585873591dafac14c1f10cd843143f0d3448a175cb04e

  • SHA512

    e396453bf0945c8807cc782bc67e83297d58c03c086e6b9f5b8ab88550845606742de0c827fef96a6017f361ff79fa3211512248ed0978772b15cf59097a3c47

  • SSDEEP

    12288:YMrLy90taMkVuZiRHxTHd8riBOlMBY0+3rXNQmJWJsWSkBi9nMMtIW+4EGjt:jyOXkBT9QGGMI2wWqdkM9MM1+st

Malware Config

Extracted

Family

redline

Botnet

dina

C2

83.97.73.122:19062

Attributes
  • auth_value

    4f77073adc624269de1bff760b9bc471

Extracted

Family

redline

Botnet

greg

C2

83.97.73.122:19062

Attributes
  • auth_value

    4c966a90781c6b4ab7f512d018696362

Targets

    • Target

      800307668df7bf73831585873591dafac14c1f10cd843143f0d3448a175cb04e

    • Size

      767KB

    • MD5

      ffe8a990d459d93dea0b29d143e98b7f

    • SHA1

      be0ce679df869993557f7bc129aa194e6ce7a370

    • SHA256

      800307668df7bf73831585873591dafac14c1f10cd843143f0d3448a175cb04e

    • SHA512

      e396453bf0945c8807cc782bc67e83297d58c03c086e6b9f5b8ab88550845606742de0c827fef96a6017f361ff79fa3211512248ed0978772b15cf59097a3c47

    • SSDEEP

      12288:YMrLy90taMkVuZiRHxTHd8riBOlMBY0+3rXNQmJWJsWSkBi9nMMtIW+4EGjt:jyOXkBT9QGGMI2wWqdkM9MM1+st

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks