General

  • Target

    f6eca8c4cb2fab511340570224bdc2ad7ca25e799d06c1c02a1aee98e85967b4

  • Size

    1.0MB

  • Sample

    230527-kmk8esbf7v

  • MD5

    b432a2632c41cceb3d9f7da400bab670

  • SHA1

    dbb0f561ba68dee18ac93c5d40cfe60a9b9996df

  • SHA256

    f6eca8c4cb2fab511340570224bdc2ad7ca25e799d06c1c02a1aee98e85967b4

  • SHA512

    a653ec98f4a070904f3a5224b9a940d4947504f6a43dcb4fb5228b1bcfa79eea69878fe2f0643e2f5ce075238ecd51ee0fd23dee3c8c58b54f1a8a4a6e6ac380

  • SSDEEP

    24576:EyvDPSBOjMHvbq8vmk3lS+RAODeeNaJFKwzPA:TvDjjMucR8SA5sZg

Malware Config

Extracted

Family

redline

Botnet

lusa

C2

83.97.73.127:19062

Attributes
  • auth_value

    c9df946711e01c378b42221de692acbd

Extracted

Family

redline

Botnet

munder

C2

83.97.73.127:19062

Attributes
  • auth_value

    159bf350f6393f0d879c80a22059fba2

Targets

    • Target

      f6eca8c4cb2fab511340570224bdc2ad7ca25e799d06c1c02a1aee98e85967b4

    • Size

      1.0MB

    • MD5

      b432a2632c41cceb3d9f7da400bab670

    • SHA1

      dbb0f561ba68dee18ac93c5d40cfe60a9b9996df

    • SHA256

      f6eca8c4cb2fab511340570224bdc2ad7ca25e799d06c1c02a1aee98e85967b4

    • SHA512

      a653ec98f4a070904f3a5224b9a940d4947504f6a43dcb4fb5228b1bcfa79eea69878fe2f0643e2f5ce075238ecd51ee0fd23dee3c8c58b54f1a8a4a6e6ac380

    • SSDEEP

      24576:EyvDPSBOjMHvbq8vmk3lS+RAODeeNaJFKwzPA:TvDjjMucR8SA5sZg

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks