General

  • Target

    4b81aecae42d14f004afc6c80653f32667fb11dc56cf21eabac4059d28d20076

  • Size

    1.0MB

  • Sample

    230526-v816wage96

  • MD5

    6476f20aa2709f3267b9826a51e60c75

  • SHA1

    1a40a8650b3b43f042f8642d8578a09e2b3fbb9e

  • SHA256

    4b81aecae42d14f004afc6c80653f32667fb11dc56cf21eabac4059d28d20076

  • SHA512

    7fd55ad68d0814561a90e1af85d27f557946df8a14a9da19a32b385b178e0c692090bcf383173e241561e9ac2ee33a3159d9c17aaeb46721bd6872290bcf3fcc

  • SSDEEP

    24576:vySL/v9ayZJLp3HyBDRsd6GbW50D1AnuafQbD9gYPJBB:64/VayZpp3HyBDCEkWq1cODmYB

Malware Config

Extracted

Family

redline

Botnet

lisa

C2

83.97.73.122:19062

Attributes
  • auth_value

    c2dc311db9820012377b054447d37949

Extracted

Family

redline

Botnet

goga

C2

83.97.73.122:19062

Attributes
  • auth_value

    6d57dff6d3c42dddb8a76dc276b8467f

Targets

    • Target

      4b81aecae42d14f004afc6c80653f32667fb11dc56cf21eabac4059d28d20076

    • Size

      1.0MB

    • MD5

      6476f20aa2709f3267b9826a51e60c75

    • SHA1

      1a40a8650b3b43f042f8642d8578a09e2b3fbb9e

    • SHA256

      4b81aecae42d14f004afc6c80653f32667fb11dc56cf21eabac4059d28d20076

    • SHA512

      7fd55ad68d0814561a90e1af85d27f557946df8a14a9da19a32b385b178e0c692090bcf383173e241561e9ac2ee33a3159d9c17aaeb46721bd6872290bcf3fcc

    • SSDEEP

      24576:vySL/v9ayZJLp3HyBDRsd6GbW50D1AnuafQbD9gYPJBB:64/VayZpp3HyBDCEkWq1cODmYB

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks