General

  • Target

    5d7fdd85bdd9c6e8c330e61d51b7897e821f83148b69a8bf1ece2bea3cfb8bf3

  • Size

    761KB

  • Sample

    230527-r63edacb56

  • MD5

    796feb5aba553ddeaf8f65e5bf8445a7

  • SHA1

    d612227f2b9a2631210f8246624fa6913968aaaf

  • SHA256

    5d7fdd85bdd9c6e8c330e61d51b7897e821f83148b69a8bf1ece2bea3cfb8bf3

  • SHA512

    c7de2994592325008919cf7b59c2d81da2b202222f61185e67fed1813136e9f53a05c6c4a76dc134966c5a234dcc01bd33280f8fd99bcf1fe1fc06e0146c9964

  • SSDEEP

    12288:tMrYy90/QMwPUjsytT2i5bk7/c5BEi7Cz369Y1skJaeRRuWcMcAkzIvf6pj:9y45SUbl2WkAbL7CzqG1VKW2AkzIaN

Malware Config

Extracted

Family

redline

Botnet

dusa

C2

83.97.73.127:19062

Attributes
  • auth_value

    ee896466545fedf9de5406175fb82de5

Extracted

Family

redline

Botnet

munder

C2

83.97.73.127:19062

Attributes
  • auth_value

    159bf350f6393f0d879c80a22059fba2

Targets

    • Target

      5d7fdd85bdd9c6e8c330e61d51b7897e821f83148b69a8bf1ece2bea3cfb8bf3

    • Size

      761KB

    • MD5

      796feb5aba553ddeaf8f65e5bf8445a7

    • SHA1

      d612227f2b9a2631210f8246624fa6913968aaaf

    • SHA256

      5d7fdd85bdd9c6e8c330e61d51b7897e821f83148b69a8bf1ece2bea3cfb8bf3

    • SHA512

      c7de2994592325008919cf7b59c2d81da2b202222f61185e67fed1813136e9f53a05c6c4a76dc134966c5a234dcc01bd33280f8fd99bcf1fe1fc06e0146c9964

    • SSDEEP

      12288:tMrYy90/QMwPUjsytT2i5bk7/c5BEi7Cz369Y1skJaeRRuWcMcAkzIvf6pj:9y45SUbl2WkAbL7CzqG1VKW2AkzIaN

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks