General

  • Target

    93735c886f181d6e324bde5828ce65eada30ef259b8606ad28e64baabdce669d

  • Size

    1.0MB

  • Sample

    230528-1885dahb7w

  • MD5

    d70934456862452b38409cb6585abe07

  • SHA1

    7d5c7a50d24eee1dad3009f94f26eb9929c73ad4

  • SHA256

    93735c886f181d6e324bde5828ce65eada30ef259b8606ad28e64baabdce669d

  • SHA512

    a8185c8b31fe487461ba0364d4be3965a12298fa18340ea58a78d4e20e892b65b8fc524f67233121f75cd606ba7711f4540b686bd6d50ef4493a87830de9a104

  • SSDEEP

    24576:PyDd/u/0FMm2X6vjb4BSeskHY3fPRed/Aae9gHPCKv8:aDBGGTet43RG/An1g

Malware Config

Extracted

Family

redline

Botnet

duxa

C2

77.91.68.157:19065

Attributes
  • auth_value

    953a331341f07583fec00af44e01ec7d

Extracted

Family

redline

Botnet

diza

C2

83.97.73.127:19045

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Extracted

Family

redline

Botnet

metro

C2

83.97.73.127:19045

Attributes
  • auth_value

    f7fd4aa816bdbaad933b45b51d9b6b1a

Targets

    • Target

      93735c886f181d6e324bde5828ce65eada30ef259b8606ad28e64baabdce669d

    • Size

      1.0MB

    • MD5

      d70934456862452b38409cb6585abe07

    • SHA1

      7d5c7a50d24eee1dad3009f94f26eb9929c73ad4

    • SHA256

      93735c886f181d6e324bde5828ce65eada30ef259b8606ad28e64baabdce669d

    • SHA512

      a8185c8b31fe487461ba0364d4be3965a12298fa18340ea58a78d4e20e892b65b8fc524f67233121f75cd606ba7711f4540b686bd6d50ef4493a87830de9a104

    • SSDEEP

      24576:PyDd/u/0FMm2X6vjb4BSeskHY3fPRed/Aae9gHPCKv8:aDBGGTet43RG/An1g

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks