General

  • Target

    4dc9a973e31b2e0948b42074e8c247438f4dfbaf5f85e40bb0c6b30ae84c04ad

  • Size

    770KB

  • Sample

    230527-yedehada22

  • MD5

    4383c6431ca4e254384a86316ec45918

  • SHA1

    e8cb8daf24e13d472e6d4abd4d69785d6ce1da54

  • SHA256

    4dc9a973e31b2e0948b42074e8c247438f4dfbaf5f85e40bb0c6b30ae84c04ad

  • SHA512

    9cb93fd6196e664ae5ddb1748665b775307371078a2e31731bb1d3cbbe53d75ba17818da2c1b5b0d40f21c95fcd7d80d41a85c15d7342cca3e560f0eccd3d2f0

  • SSDEEP

    12288:hMr0y902ZHkflFCkbgBDHYsNDavt2VU+bxqGO9mZlCGDB3ki/AYAQboVhuDKdG4g:lyhACkCDN4oGBGb/VB3k8DIsKdGX

Malware Config

Extracted

Family

redline

Botnet

dura

C2

83.97.73.127:19062

Attributes
  • auth_value

    44b7d6fb9572dea0d64d018139c3d208

Extracted

Family

redline

Botnet

heroy

C2

83.97.73.127:19062

Attributes
  • auth_value

    b2879468e50d2d36e66f1a067d4a8bb3

Targets

    • Target

      4dc9a973e31b2e0948b42074e8c247438f4dfbaf5f85e40bb0c6b30ae84c04ad

    • Size

      770KB

    • MD5

      4383c6431ca4e254384a86316ec45918

    • SHA1

      e8cb8daf24e13d472e6d4abd4d69785d6ce1da54

    • SHA256

      4dc9a973e31b2e0948b42074e8c247438f4dfbaf5f85e40bb0c6b30ae84c04ad

    • SHA512

      9cb93fd6196e664ae5ddb1748665b775307371078a2e31731bb1d3cbbe53d75ba17818da2c1b5b0d40f21c95fcd7d80d41a85c15d7342cca3e560f0eccd3d2f0

    • SSDEEP

      12288:hMr0y902ZHkflFCkbgBDHYsNDavt2VU+bxqGO9mZlCGDB3ki/AYAQboVhuDKdG4g:lyhACkCDN4oGBGb/VB3k8DIsKdGX

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks