General

  • Target

    c7a981fab6dd00b53f8d72ede8e56f8a022dd2b0ee2f25ba51a5646af881894b

  • Size

    771KB

  • Sample

    230527-znkevade7x

  • MD5

    f00108f9ca8d5362c246b97ba48bf802

  • SHA1

    26c43cac4d869e0e4829fa2d2d167a74344b2e76

  • SHA256

    c7a981fab6dd00b53f8d72ede8e56f8a022dd2b0ee2f25ba51a5646af881894b

  • SHA512

    6b76cfdb917494dd2d2de003c11de3c13bfcf44c9e70f39dd5ddf874436c3e300357b9f1b7b25e3d3e71531099be63a6bb64bfe66dbf5638dd8d9e7eb1b64ffd

  • SSDEEP

    12288:xMrvy90Ec5QhR6JfkbGUOt8TDeBdhCbjNLvDnKuNXR1m+jm6yicS/JotUcth4B:6y25Y6uyxQaBdMFDnKuhDjotUcth4B

Malware Config

Extracted

Family

redline

Botnet

dura

C2

83.97.73.127:19062

Attributes
  • auth_value

    44b7d6fb9572dea0d64d018139c3d208

Extracted

Family

redline

Botnet

heroy

C2

83.97.73.127:19062

Attributes
  • auth_value

    b2879468e50d2d36e66f1a067d4a8bb3

Targets

    • Target

      c7a981fab6dd00b53f8d72ede8e56f8a022dd2b0ee2f25ba51a5646af881894b

    • Size

      771KB

    • MD5

      f00108f9ca8d5362c246b97ba48bf802

    • SHA1

      26c43cac4d869e0e4829fa2d2d167a74344b2e76

    • SHA256

      c7a981fab6dd00b53f8d72ede8e56f8a022dd2b0ee2f25ba51a5646af881894b

    • SHA512

      6b76cfdb917494dd2d2de003c11de3c13bfcf44c9e70f39dd5ddf874436c3e300357b9f1b7b25e3d3e71531099be63a6bb64bfe66dbf5638dd8d9e7eb1b64ffd

    • SSDEEP

      12288:xMrvy90Ec5QhR6JfkbGUOt8TDeBdhCbjNLvDnKuNXR1m+jm6yicS/JotUcth4B:6y25Y6uyxQaBdMFDnKuhDjotUcth4B

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks