General

  • Target

    6d586921f3d76be2a1164e5bd1b8588490fcc731cf7f2ac383211ade77a46b14

  • Size

    780KB

  • Sample

    230528-m6yc7seh74

  • MD5

    a4e1dee06978c99c028f3031cb8290f6

  • SHA1

    650f1e0a0e56ba4f54c3d74d33091584c447a0ac

  • SHA256

    6d586921f3d76be2a1164e5bd1b8588490fcc731cf7f2ac383211ade77a46b14

  • SHA512

    dd74960f3bb19525cc3e971373445db5dba55792368b489e7c490c3a27507542c357181776426e2f59e06a023719d94320ed53ba558564f9f36f2e6945047f73

  • SSDEEP

    12288:0MrOy90BRSlJxG8aIWatAgkdJirt24qfoIq2fRnrz32+PIFNGDy/:yyKSDc815ogrtnqf7BfRnrLDAFoDy/

Malware Config

Extracted

Family

redline

Botnet

daswa

C2

83.97.73.127:19062

Attributes
  • auth_value

    a6ab6b8df5480a0bb295d3c069f67bf8

Extracted

Family

redline

Botnet

mirko

C2

83.97.73.127:19062

Attributes
  • auth_value

    35111a095377107ec8b7d3e035831af8

Targets

    • Target

      6d586921f3d76be2a1164e5bd1b8588490fcc731cf7f2ac383211ade77a46b14

    • Size

      780KB

    • MD5

      a4e1dee06978c99c028f3031cb8290f6

    • SHA1

      650f1e0a0e56ba4f54c3d74d33091584c447a0ac

    • SHA256

      6d586921f3d76be2a1164e5bd1b8588490fcc731cf7f2ac383211ade77a46b14

    • SHA512

      dd74960f3bb19525cc3e971373445db5dba55792368b489e7c490c3a27507542c357181776426e2f59e06a023719d94320ed53ba558564f9f36f2e6945047f73

    • SSDEEP

      12288:0MrOy90BRSlJxG8aIWatAgkdJirt24qfoIq2fRnrz32+PIFNGDy/:yyKSDc815ogrtnqf7BfRnrLDAFoDy/

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks