General

  • Target

    c91d0fde0ea1b3d1490fba7b1b2fe0f0b76070aea9aa9ee4e81bfb4500ca9b4f

  • Size

    769KB

  • Sample

    230527-pjlf8scb9y

  • MD5

    d7370a67487e08e635a0831e2cf16ee6

  • SHA1

    b2512c1f427ca78c474ea7564b929c520af145f9

  • SHA256

    c91d0fde0ea1b3d1490fba7b1b2fe0f0b76070aea9aa9ee4e81bfb4500ca9b4f

  • SHA512

    f382533281927cfec89815051c9a3fd6f0a97acd39b546b0f4588f782aecad539103b7b9902a1749f6784bd06a8c9a03685c84dccfa8d8e00095bb6ac5d1f1a8

  • SSDEEP

    24576:2ylEjSY7rH5hK6yeqyAvgWC8CVk3NSb2:FsSYHH7JKvgD94k

Malware Config

Extracted

Family

redline

Botnet

dusa

C2

83.97.73.127:19062

Attributes
  • auth_value

    ee896466545fedf9de5406175fb82de5

Extracted

Family

redline

Botnet

munder

C2

83.97.73.127:19062

Attributes
  • auth_value

    159bf350f6393f0d879c80a22059fba2

Targets

    • Target

      c91d0fde0ea1b3d1490fba7b1b2fe0f0b76070aea9aa9ee4e81bfb4500ca9b4f

    • Size

      769KB

    • MD5

      d7370a67487e08e635a0831e2cf16ee6

    • SHA1

      b2512c1f427ca78c474ea7564b929c520af145f9

    • SHA256

      c91d0fde0ea1b3d1490fba7b1b2fe0f0b76070aea9aa9ee4e81bfb4500ca9b4f

    • SHA512

      f382533281927cfec89815051c9a3fd6f0a97acd39b546b0f4588f782aecad539103b7b9902a1749f6784bd06a8c9a03685c84dccfa8d8e00095bb6ac5d1f1a8

    • SSDEEP

      24576:2ylEjSY7rH5hK6yeqyAvgWC8CVk3NSb2:FsSYHH7JKvgD94k

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks