General

  • Target

    dd1f404b9e6b340a800f3ee5701d30db3ce2715278e91374935318fd33c245e8

  • Size

    769KB

  • Sample

    230528-jw468aef28

  • MD5

    2982832951acef37e4ddb1326573e5a4

  • SHA1

    1b8337cad15972076d4aff3a6ec7ac9131952923

  • SHA256

    dd1f404b9e6b340a800f3ee5701d30db3ce2715278e91374935318fd33c245e8

  • SHA512

    476730308ea9c044787f15110a1065b27ec318be0a43fc2f7c6313b4b317c3fefe9ea407a3c46aeee2de4e0524681473b298439406923a8eb74057c817536d86

  • SSDEEP

    12288:NMriy90FrMv8FkcoBHPXvCLTyJrQNKJ+dr/XWUxh03gwsgGXvegVnm9+r/BWnpv:fyyXu3PXvuJ/Zj0QwsgaZlBWpv

Malware Config

Extracted

Family

redline

Botnet

dura

C2

83.97.73.127:19062

Attributes
  • auth_value

    44b7d6fb9572dea0d64d018139c3d208

Extracted

Family

redline

Botnet

heroy

C2

83.97.73.127:19062

Attributes
  • auth_value

    b2879468e50d2d36e66f1a067d4a8bb3

Targets

    • Target

      dd1f404b9e6b340a800f3ee5701d30db3ce2715278e91374935318fd33c245e8

    • Size

      769KB

    • MD5

      2982832951acef37e4ddb1326573e5a4

    • SHA1

      1b8337cad15972076d4aff3a6ec7ac9131952923

    • SHA256

      dd1f404b9e6b340a800f3ee5701d30db3ce2715278e91374935318fd33c245e8

    • SHA512

      476730308ea9c044787f15110a1065b27ec318be0a43fc2f7c6313b4b317c3fefe9ea407a3c46aeee2de4e0524681473b298439406923a8eb74057c817536d86

    • SSDEEP

      12288:NMriy90FrMv8FkcoBHPXvCLTyJrQNKJ+dr/XWUxh03gwsgGXvegVnm9+r/BWnpv:fyyXu3PXvuJ/Zj0QwsgaZlBWpv

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks