General

  • Target

    f73314055626d03f62e9cb3ce28ddeb11c7cfff00a2a745daf1dabcabd1112e0

  • Size

    769KB

  • Sample

    230527-2gmbzadg8z

  • MD5

    c5bd18203d6e04f33f3c1cf9928e69f3

  • SHA1

    c01bb285a046302a3acfc00bf84f8a333b0238a8

  • SHA256

    f73314055626d03f62e9cb3ce28ddeb11c7cfff00a2a745daf1dabcabd1112e0

  • SHA512

    b81f8c6870ca9a46ab1cba233255711970fbec2c35bd90108e55b08080a79ab3597e76446d5e479eec034523846c30fb90f360a64af6a0cc454713723f8e43f7

  • SSDEEP

    12288:iMrFy90bhYubX5Mz3QfPk7wTMHT/PJXw2lMWRXFJkBYxPhUX5I7:byMhRuzGPkkYzpg2lbnkBYFhkw

Malware Config

Extracted

Family

redline

Botnet

dura

C2

83.97.73.127:19062

Attributes
  • auth_value

    44b7d6fb9572dea0d64d018139c3d208

Extracted

Family

redline

Botnet

heroy

C2

83.97.73.127:19062

Attributes
  • auth_value

    b2879468e50d2d36e66f1a067d4a8bb3

Targets

    • Target

      f73314055626d03f62e9cb3ce28ddeb11c7cfff00a2a745daf1dabcabd1112e0

    • Size

      769KB

    • MD5

      c5bd18203d6e04f33f3c1cf9928e69f3

    • SHA1

      c01bb285a046302a3acfc00bf84f8a333b0238a8

    • SHA256

      f73314055626d03f62e9cb3ce28ddeb11c7cfff00a2a745daf1dabcabd1112e0

    • SHA512

      b81f8c6870ca9a46ab1cba233255711970fbec2c35bd90108e55b08080a79ab3597e76446d5e479eec034523846c30fb90f360a64af6a0cc454713723f8e43f7

    • SSDEEP

      12288:iMrFy90bhYubX5Mz3QfPk7wTMHT/PJXw2lMWRXFJkBYxPhUX5I7:byMhRuzGPkkYzpg2lbnkBYFhkw

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks