General

  • Target

    84afad0c8ab2f0c689026179790547ffadbb61f6b7e30fbd406b304622f4f85b

  • Size

    763KB

  • Sample

    230526-h5vtgaec78

  • MD5

    192e9c29b5e30d7c00ec79adad0aca76

  • SHA1

    27a1b21c1ee9f90733cd6fc6a824c34bcf480dce

  • SHA256

    84afad0c8ab2f0c689026179790547ffadbb61f6b7e30fbd406b304622f4f85b

  • SHA512

    f665b705614f08e16aef4c32ad1d85e439423752fe597d51b3c475602950a6cbdbe9dbaf26aa17673fd410e3330ae0cb166e1a5a4b01212c88ca3d43ede0ad46

  • SSDEEP

    12288:IMrHy90Ff5ePWEXBZ6Y4PMI+209H0PesmhYkmcmpAuCDWdIMlqXkB8CnM6tIH+dH:PyOL1Y4PzARsmhgcXjDqZ0k+CM6w+eU

Malware Config

Extracted

Family

redline

Botnet

dina

C2

83.97.73.122:19062

Attributes
  • auth_value

    4f77073adc624269de1bff760b9bc471

Extracted

Family

redline

Botnet

greg

C2

83.97.73.122:19062

Attributes
  • auth_value

    4c966a90781c6b4ab7f512d018696362

Targets

    • Target

      84afad0c8ab2f0c689026179790547ffadbb61f6b7e30fbd406b304622f4f85b

    • Size

      763KB

    • MD5

      192e9c29b5e30d7c00ec79adad0aca76

    • SHA1

      27a1b21c1ee9f90733cd6fc6a824c34bcf480dce

    • SHA256

      84afad0c8ab2f0c689026179790547ffadbb61f6b7e30fbd406b304622f4f85b

    • SHA512

      f665b705614f08e16aef4c32ad1d85e439423752fe597d51b3c475602950a6cbdbe9dbaf26aa17673fd410e3330ae0cb166e1a5a4b01212c88ca3d43ede0ad46

    • SSDEEP

      12288:IMrHy90Ff5ePWEXBZ6Y4PMI+209H0PesmhYkmcmpAuCDWdIMlqXkB8CnM6tIH+dH:PyOL1Y4PzARsmhgcXjDqZ0k+CM6w+eU

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks