General

  • Target

    34ee6099d74c4fb0c0c9e5775a3bbc42486f8a76802e7205ac581bbc724b8d55

  • Size

    764KB

  • Sample

    230526-q8fsqafg44

  • MD5

    19f32703cd522635370df4619ebeb78a

  • SHA1

    ad1eb87c9ac918ed67aa28e6d0087cf856154909

  • SHA256

    34ee6099d74c4fb0c0c9e5775a3bbc42486f8a76802e7205ac581bbc724b8d55

  • SHA512

    8c49931a7c383ef58eeb387c11bd20774e9fc66e4e72db758ebc23efb301ad44656685ba6d9224538a10f7dad16396dd534d2da365d21e0eb9c2900f7bed0eca

  • SSDEEP

    12288:NMrPy90oE3fUxLf/AdX6ITqxik2d9bNTM3tZ4oFXNqJpwRLZIC8mp4dRlmd8LBWI:CyvLfvWqxikWTIWolGpwYC8a4Dlmdo8G

Malware Config

Extracted

Family

redline

Botnet

disa

C2

83.97.73.122:19062

Attributes
  • auth_value

    93f8c4ca7000e3381dd4b6b86434de05

Extracted

Family

redline

Botnet

goga

C2

83.97.73.122:19062

Attributes
  • auth_value

    6d57dff6d3c42dddb8a76dc276b8467f

Targets

    • Target

      34ee6099d74c4fb0c0c9e5775a3bbc42486f8a76802e7205ac581bbc724b8d55

    • Size

      764KB

    • MD5

      19f32703cd522635370df4619ebeb78a

    • SHA1

      ad1eb87c9ac918ed67aa28e6d0087cf856154909

    • SHA256

      34ee6099d74c4fb0c0c9e5775a3bbc42486f8a76802e7205ac581bbc724b8d55

    • SHA512

      8c49931a7c383ef58eeb387c11bd20774e9fc66e4e72db758ebc23efb301ad44656685ba6d9224538a10f7dad16396dd534d2da365d21e0eb9c2900f7bed0eca

    • SSDEEP

      12288:NMrPy90oE3fUxLf/AdX6ITqxik2d9bNTM3tZ4oFXNqJpwRLZIC8mp4dRlmd8LBWI:CyvLfvWqxikWTIWolGpwYC8a4Dlmdo8G

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks