General

  • Target

    b92f5398c9197c1f5c77860081b89e46d64818b412a26303729b847b0b7c54c1

  • Size

    769KB

  • Sample

    230527-2jaqysdg9s

  • MD5

    84db9c2b3ec648784ea31270837b5049

  • SHA1

    f0cb9b44af345ccc8b7df73cf322e012bcb787f6

  • SHA256

    b92f5398c9197c1f5c77860081b89e46d64818b412a26303729b847b0b7c54c1

  • SHA512

    763afff27020b3def0d047e56090e0a11c4dcbbd75494cb057e30e41281f901b5b6b6f861fbc88cc37c7664f23f4bb12688773a1de6847ab9ffddc56ff45aef5

  • SSDEEP

    24576:0yfXFBWviQFzwvVolP4Xx+9pNeHoW9pk7:DPGiGzbP4h+pNMo+

Malware Config

Extracted

Family

redline

Botnet

mura

C2

83.97.73.127:19062

Attributes
  • auth_value

    b2ee4a66a20fb9e998d6a68277565331

Extracted

Family

redline

Botnet

heroy

C2

83.97.73.127:19062

Attributes
  • auth_value

    b2879468e50d2d36e66f1a067d4a8bb3

Targets

    • Target

      b92f5398c9197c1f5c77860081b89e46d64818b412a26303729b847b0b7c54c1

    • Size

      769KB

    • MD5

      84db9c2b3ec648784ea31270837b5049

    • SHA1

      f0cb9b44af345ccc8b7df73cf322e012bcb787f6

    • SHA256

      b92f5398c9197c1f5c77860081b89e46d64818b412a26303729b847b0b7c54c1

    • SHA512

      763afff27020b3def0d047e56090e0a11c4dcbbd75494cb057e30e41281f901b5b6b6f861fbc88cc37c7664f23f4bb12688773a1de6847ab9ffddc56ff45aef5

    • SSDEEP

      24576:0yfXFBWviQFzwvVolP4Xx+9pNeHoW9pk7:DPGiGzbP4h+pNMo+

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks