General

  • Target

    9df7f4489f93013fbe60f93c512a1c73240bbb65b20459b7885d02a8184c8bb9

  • Size

    770KB

  • Sample

    230527-cntxysae4t

  • MD5

    696aff931c457955186ffde5ffa0099b

  • SHA1

    6ff5aad1a2878b1b90352c837715fc77c11302e8

  • SHA256

    9df7f4489f93013fbe60f93c512a1c73240bbb65b20459b7885d02a8184c8bb9

  • SHA512

    20a81a46a6e6d8b3cefb7dd598b32eb5ecfa74097a9ddbf05f832237a9d7144dc29557e1baf6535b5fdb11194b75945847c788dd951be5c5be06d366b254c7af

  • SSDEEP

    24576:Ay/AvjZwKrEKTsXDk9nW5NY8Tnk3vSU+LJ:HQihKTQDYnW5WAKa1

Malware Config

Extracted

Family

redline

Botnet

dusa

C2

83.97.73.127:19062

Attributes
  • auth_value

    ee896466545fedf9de5406175fb82de5

Extracted

Family

redline

Botnet

munder

C2

83.97.73.127:19062

Attributes
  • auth_value

    159bf350f6393f0d879c80a22059fba2

Targets

    • Target

      9df7f4489f93013fbe60f93c512a1c73240bbb65b20459b7885d02a8184c8bb9

    • Size

      770KB

    • MD5

      696aff931c457955186ffde5ffa0099b

    • SHA1

      6ff5aad1a2878b1b90352c837715fc77c11302e8

    • SHA256

      9df7f4489f93013fbe60f93c512a1c73240bbb65b20459b7885d02a8184c8bb9

    • SHA512

      20a81a46a6e6d8b3cefb7dd598b32eb5ecfa74097a9ddbf05f832237a9d7144dc29557e1baf6535b5fdb11194b75945847c788dd951be5c5be06d366b254c7af

    • SSDEEP

      24576:Ay/AvjZwKrEKTsXDk9nW5NY8Tnk3vSU+LJ:HQihKTQDYnW5WAKa1

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks