General

  • Target

    9a448c8c4d275decaf3cf36189e1aadac43c8fb6c4893292e1b93f5bef87063d

  • Size

    763KB

  • Sample

    230526-jxs6cafa7y

  • MD5

    bc5bfe2a2c2ed3f1e9830070105f8de6

  • SHA1

    6722a0a25399b1dc32b25f9e9dc55d6c491983e4

  • SHA256

    9a448c8c4d275decaf3cf36189e1aadac43c8fb6c4893292e1b93f5bef87063d

  • SHA512

    a30c51209598b20e08b26b7eaebf9e24f24f78ec3eb90d7e736fe7cc876d27fb99e4f05e4c7638fab9c94afde97324fb2b7ce7e609c0f75acae7a6917734549e

  • SSDEEP

    12288:3MrIy90ODC4P/4+Ac4x+0spqfPwJ8UzZeF9UGI23tl0ZC2VBYcakB8onM6tIM+8Z:3ybzYHnskfK8UzZ09UOdlcsPk+oM6D+w

Malware Config

Extracted

Family

redline

Botnet

dina

C2

83.97.73.122:19062

Attributes
  • auth_value

    4f77073adc624269de1bff760b9bc471

Extracted

Family

redline

Botnet

greg

C2

83.97.73.122:19062

Attributes
  • auth_value

    4c966a90781c6b4ab7f512d018696362

Targets

    • Target

      9a448c8c4d275decaf3cf36189e1aadac43c8fb6c4893292e1b93f5bef87063d

    • Size

      763KB

    • MD5

      bc5bfe2a2c2ed3f1e9830070105f8de6

    • SHA1

      6722a0a25399b1dc32b25f9e9dc55d6c491983e4

    • SHA256

      9a448c8c4d275decaf3cf36189e1aadac43c8fb6c4893292e1b93f5bef87063d

    • SHA512

      a30c51209598b20e08b26b7eaebf9e24f24f78ec3eb90d7e736fe7cc876d27fb99e4f05e4c7638fab9c94afde97324fb2b7ce7e609c0f75acae7a6917734549e

    • SSDEEP

      12288:3MrIy90ODC4P/4+Ac4x+0spqfPwJ8UzZeF9UGI23tl0ZC2VBYcakB8onM6tIM+8Z:3ybzYHnskfK8UzZ09UOdlcsPk+oM6D+w

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks