General

  • Target

    b71e2219d0902884729d8813d80e91b7eba055d732393dc4e889f41ad8664cad

  • Size

    771KB

  • Sample

    230527-gdfd2abb9v

  • MD5

    3b572d5e0feed7300e93c9821f58b970

  • SHA1

    6769316eb070c248feed0a4795cd95dbe2cdd732

  • SHA256

    b71e2219d0902884729d8813d80e91b7eba055d732393dc4e889f41ad8664cad

  • SHA512

    9f4b538d4b2b09efeb19a377741ba1d41021fced677c08036b5fa8001504d59b62fc74c2b27222ff35db31da2a2ac2ae7518d92c2388c8beaa7a83e448875a2e

  • SSDEEP

    12288:UMrJy90E/TbxQTdhkrwD1v7blAoaEfLjpgkLbvMGH0m8T9J3+eULk3NTeSC+mm:Ny3RQvF1jpAoRHqmbMs0m86fk30SC+7

Malware Config

Extracted

Family

redline

Botnet

musa

C2

83.97.73.127:19062

Attributes
  • auth_value

    745cd242a52ab79c9c9026155d62f359

Extracted

Family

redline

Botnet

munder

C2

83.97.73.127:19062

Attributes
  • auth_value

    159bf350f6393f0d879c80a22059fba2

Targets

    • Target

      b71e2219d0902884729d8813d80e91b7eba055d732393dc4e889f41ad8664cad

    • Size

      771KB

    • MD5

      3b572d5e0feed7300e93c9821f58b970

    • SHA1

      6769316eb070c248feed0a4795cd95dbe2cdd732

    • SHA256

      b71e2219d0902884729d8813d80e91b7eba055d732393dc4e889f41ad8664cad

    • SHA512

      9f4b538d4b2b09efeb19a377741ba1d41021fced677c08036b5fa8001504d59b62fc74c2b27222ff35db31da2a2ac2ae7518d92c2388c8beaa7a83e448875a2e

    • SSDEEP

      12288:UMrJy90E/TbxQTdhkrwD1v7blAoaEfLjpgkLbvMGH0m8T9J3+eULk3NTeSC+mm:Ny3RQvF1jpAoRHqmbMs0m86fk30SC+7

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks