General

  • Target

    b188cf4070a59c216fd740a765be24eb508d81ec826e60ed8222a40dd903a07d

  • Size

    761KB

  • Sample

    230527-tgbapscd24

  • MD5

    c4391babdefa5be4c5764788f0437cbc

  • SHA1

    784a279cde91890e9f402cdc3615af6888b47acd

  • SHA256

    b188cf4070a59c216fd740a765be24eb508d81ec826e60ed8222a40dd903a07d

  • SHA512

    00a05adc119a25fe507f56f2e54077f7aec1782f7e14ec2247ce6600db41c585243340160a042f96f3c499069f7578263d950388d98a2998da42dc8e308a97cc

  • SSDEEP

    12288:yMrZy9090puDtlF3o9BXIMDiXXiaScJ1GxSSAO11FQ7WcozGYEvtAEdMxZ/0:Dyu0pck9BpSu11EWf6ddMxZ/0

Malware Config

Extracted

Family

redline

Botnet

dura

C2

83.97.73.127:19062

Attributes
  • auth_value

    44b7d6fb9572dea0d64d018139c3d208

Extracted

Family

redline

Botnet

heroy

C2

83.97.73.127:19062

Attributes
  • auth_value

    b2879468e50d2d36e66f1a067d4a8bb3

Targets

    • Target

      b188cf4070a59c216fd740a765be24eb508d81ec826e60ed8222a40dd903a07d

    • Size

      761KB

    • MD5

      c4391babdefa5be4c5764788f0437cbc

    • SHA1

      784a279cde91890e9f402cdc3615af6888b47acd

    • SHA256

      b188cf4070a59c216fd740a765be24eb508d81ec826e60ed8222a40dd903a07d

    • SHA512

      00a05adc119a25fe507f56f2e54077f7aec1782f7e14ec2247ce6600db41c585243340160a042f96f3c499069f7578263d950388d98a2998da42dc8e308a97cc

    • SSDEEP

      12288:yMrZy9090puDtlF3o9BXIMDiXXiaScJ1GxSSAO11FQ7WcozGYEvtAEdMxZ/0:Dyu0pck9BpSu11EWf6ddMxZ/0

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks