General

  • Target

    39045683ee4bef63df4987cc0fb8533385612e44e127d620327e6daad9f1548e

  • Size

    761KB

  • Sample

    230527-p61vfacc7s

  • MD5

    445c94d68d7850664484ee02ddd01e6d

  • SHA1

    ba0f903d19f6473086d270d1c303a646f2be0215

  • SHA256

    39045683ee4bef63df4987cc0fb8533385612e44e127d620327e6daad9f1548e

  • SHA512

    5179e0ac4652025660fea7218ed458a167004f6de8b8ce8e8e2f1a4674359a3da39b43a127978668232e3cc7300ee057e357a378604b730c76026cf34afde9db

  • SSDEEP

    12288:kMrxy90125U+wnEEB9F+Cd3IcpsHV/0Ag2f4PHe0veNxAUiJ0nN74gUJP:dyJwnE2Bd3IcihTr4PHvve7Aj0d43P

Malware Config

Extracted

Family

redline

Botnet

musa

C2

83.97.73.127:19062

Attributes
  • auth_value

    745cd242a52ab79c9c9026155d62f359

Extracted

Family

redline

Botnet

munder

C2

83.97.73.127:19062

Attributes
  • auth_value

    159bf350f6393f0d879c80a22059fba2

Targets

    • Target

      39045683ee4bef63df4987cc0fb8533385612e44e127d620327e6daad9f1548e

    • Size

      761KB

    • MD5

      445c94d68d7850664484ee02ddd01e6d

    • SHA1

      ba0f903d19f6473086d270d1c303a646f2be0215

    • SHA256

      39045683ee4bef63df4987cc0fb8533385612e44e127d620327e6daad9f1548e

    • SHA512

      5179e0ac4652025660fea7218ed458a167004f6de8b8ce8e8e2f1a4674359a3da39b43a127978668232e3cc7300ee057e357a378604b730c76026cf34afde9db

    • SSDEEP

      12288:kMrxy90125U+wnEEB9F+Cd3IcpsHV/0Ag2f4PHe0veNxAUiJ0nN74gUJP:dyJwnE2Bd3IcihTr4PHvve7Aj0d43P

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks