General

  • Target

    df0cb27f1f3e58e35789689fc5629df56e962d854d081a1dc104380416018dba

  • Size

    760KB

  • Sample

    230527-tqcvwscg9w

  • MD5

    d3e12f0c7de252f808ff05faa781775f

  • SHA1

    a607a9eb4deeb8b418077180663482ee7f5f5106

  • SHA256

    df0cb27f1f3e58e35789689fc5629df56e962d854d081a1dc104380416018dba

  • SHA512

    cdfa02fc77d1a15d6c0fa94595e48943d04a85f9c50402dcd5cc66f2b4b79c33dd0114cc660606c89c1ea1f2e4b4af8c42eea1993a4b59c017ee1d17dfa0705c

  • SSDEEP

    12288:xMrfy90bUsN4BTt3qds7fDanY07x0HFfY2vhRTuJTYx5wTwrso:CyMxWTcWbOYhTTMYxuTc

Malware Config

Extracted

Family

redline

Botnet

dura

C2

83.97.73.127:19062

Attributes
  • auth_value

    44b7d6fb9572dea0d64d018139c3d208

Extracted

Family

redline

Botnet

heroy

C2

83.97.73.127:19062

Attributes
  • auth_value

    b2879468e50d2d36e66f1a067d4a8bb3

Targets

    • Target

      df0cb27f1f3e58e35789689fc5629df56e962d854d081a1dc104380416018dba

    • Size

      760KB

    • MD5

      d3e12f0c7de252f808ff05faa781775f

    • SHA1

      a607a9eb4deeb8b418077180663482ee7f5f5106

    • SHA256

      df0cb27f1f3e58e35789689fc5629df56e962d854d081a1dc104380416018dba

    • SHA512

      cdfa02fc77d1a15d6c0fa94595e48943d04a85f9c50402dcd5cc66f2b4b79c33dd0114cc660606c89c1ea1f2e4b4af8c42eea1993a4b59c017ee1d17dfa0705c

    • SSDEEP

      12288:xMrfy90bUsN4BTt3qds7fDanY07x0HFfY2vhRTuJTYx5wTwrso:CyMxWTcWbOYhTTMYxuTc

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks