General

  • Target

    b2d7559b8595f4203d0ea55b2e8c30abe46a83a11b7c8cca1a0e44c1345e5ca6

  • Size

    770KB

  • Sample

    230527-em36caah8v

  • MD5

    7c298a096b30230292478920a0d676dc

  • SHA1

    d47b7056022617913fad5b98b53a4d5b66e4bec7

  • SHA256

    b2d7559b8595f4203d0ea55b2e8c30abe46a83a11b7c8cca1a0e44c1345e5ca6

  • SHA512

    2b81d0af18361839e3ca785f24d7bde4f1dc171a9ef949c53cc90f5a4b8b1c86bd388674129cb029e66432a22b2eae27bdbc8fe2788066eb51b42d6d82a674a3

  • SSDEEP

    24576:YyX1K2sLvxxjZlkeUO6dVMkLlHPY8EEk3iS7fhOG:fX1fsvjVlkeIJtAvXlDE

Malware Config

Extracted

Family

redline

Botnet

dusa

C2

83.97.73.127:19062

Attributes
  • auth_value

    ee896466545fedf9de5406175fb82de5

Extracted

Family

redline

Botnet

munder

C2

83.97.73.127:19062

Attributes
  • auth_value

    159bf350f6393f0d879c80a22059fba2

Targets

    • Target

      b2d7559b8595f4203d0ea55b2e8c30abe46a83a11b7c8cca1a0e44c1345e5ca6

    • Size

      770KB

    • MD5

      7c298a096b30230292478920a0d676dc

    • SHA1

      d47b7056022617913fad5b98b53a4d5b66e4bec7

    • SHA256

      b2d7559b8595f4203d0ea55b2e8c30abe46a83a11b7c8cca1a0e44c1345e5ca6

    • SHA512

      2b81d0af18361839e3ca785f24d7bde4f1dc171a9ef949c53cc90f5a4b8b1c86bd388674129cb029e66432a22b2eae27bdbc8fe2788066eb51b42d6d82a674a3

    • SSDEEP

      24576:YyX1K2sLvxxjZlkeUO6dVMkLlHPY8EEk3iS7fhOG:fX1fsvjVlkeIJtAvXlDE

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks