General

  • Target

    093ade18b103c60b13e2b8b84e2c5b4f3db72ec07a9a3febec774d28c86f7819

  • Size

    770KB

  • Sample

    230526-tjzfbagc68

  • MD5

    ad997e75b2e28db63e0abbf82f770b91

  • SHA1

    fda08d11f1771642f1aac9abb34c354a459eb93e

  • SHA256

    093ade18b103c60b13e2b8b84e2c5b4f3db72ec07a9a3febec774d28c86f7819

  • SHA512

    4fa06885fd59be68a79112aa58ecd3aac1abfd997d9862cf229e091fe21a55875ba05b3a2b6d4ed759690779cbbc6b4001987278acbebc62df7cf0f89a918eac

  • SSDEEP

    24576:4ywCGkViOiWzVGxezEqKSNjh0n8bZj46bqJ:/lGiLVG+EqRN10+Z8n

Malware Config

Extracted

Family

redline

Botnet

disa

C2

83.97.73.122:19062

Attributes
  • auth_value

    93f8c4ca7000e3381dd4b6b86434de05

Extracted

Family

redline

Botnet

goga

C2

83.97.73.122:19062

Attributes
  • auth_value

    6d57dff6d3c42dddb8a76dc276b8467f

Targets

    • Target

      093ade18b103c60b13e2b8b84e2c5b4f3db72ec07a9a3febec774d28c86f7819

    • Size

      770KB

    • MD5

      ad997e75b2e28db63e0abbf82f770b91

    • SHA1

      fda08d11f1771642f1aac9abb34c354a459eb93e

    • SHA256

      093ade18b103c60b13e2b8b84e2c5b4f3db72ec07a9a3febec774d28c86f7819

    • SHA512

      4fa06885fd59be68a79112aa58ecd3aac1abfd997d9862cf229e091fe21a55875ba05b3a2b6d4ed759690779cbbc6b4001987278acbebc62df7cf0f89a918eac

    • SSDEEP

      24576:4ywCGkViOiWzVGxezEqKSNjh0n8bZj46bqJ:/lGiLVG+EqRN10+Z8n

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks