General

  • Target

    48a2dc20b11de317714d2905ef7f153d15d402df29f82931d22227b0e11251c4

  • Size

    1.0MB

  • Sample

    230526-gv9zzaea89

  • MD5

    452421df9634d94b90977a4733130eb4

  • SHA1

    8bd095897a234ed7248d4d9b7ee45752024fca62

  • SHA256

    48a2dc20b11de317714d2905ef7f153d15d402df29f82931d22227b0e11251c4

  • SHA512

    84eeb4632cabbddf2a42cf19b5dc04d4ae07c1969e047288c2fee2cf88c3b9cbdc2e42199cf276ae86b72d970849a39957e10207d778f7da3864e9552b77d6db

  • SSDEEP

    24576:6yWzFVDPiHeE52kwKM6k+Mezu2t6mwEaZ/rfV1MI78:BuK+hKM6k+vGtEO/rs

Malware Config

Extracted

Family

redline

Botnet

lina

C2

83.97.73.122:19062

Attributes
  • auth_value

    13523aee5d194d7716b22eeab7de10ad

Extracted

Family

redline

Botnet

greg

C2

83.97.73.122:19062

Attributes
  • auth_value

    4c966a90781c6b4ab7f512d018696362

Targets

    • Target

      48a2dc20b11de317714d2905ef7f153d15d402df29f82931d22227b0e11251c4

    • Size

      1.0MB

    • MD5

      452421df9634d94b90977a4733130eb4

    • SHA1

      8bd095897a234ed7248d4d9b7ee45752024fca62

    • SHA256

      48a2dc20b11de317714d2905ef7f153d15d402df29f82931d22227b0e11251c4

    • SHA512

      84eeb4632cabbddf2a42cf19b5dc04d4ae07c1969e047288c2fee2cf88c3b9cbdc2e42199cf276ae86b72d970849a39957e10207d778f7da3864e9552b77d6db

    • SSDEEP

      24576:6yWzFVDPiHeE52kwKM6k+Mezu2t6mwEaZ/rfV1MI78:BuK+hKM6k+vGtEO/rs

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks