General

  • Target

    3617ccf39b1fad4c20d03a58a85f72159bbdd31488ca1833f49081e3e1c77fd5

  • Size

    781KB

  • Sample

    230528-n362lsfa62

  • MD5

    adce23fcc0df4d8575bc3b4e0bdaecdd

  • SHA1

    a9f5427ead40aa75a7bad13d956caa45c8bdc16c

  • SHA256

    3617ccf39b1fad4c20d03a58a85f72159bbdd31488ca1833f49081e3e1c77fd5

  • SHA512

    4a8dc6183c8422ff4234f9782cf17b4449e6cae43183c7987ad48cd454cf04a5963627d70709b73540776314a33d14d2e8206189d139e59cf45fbb7c91627b6a

  • SSDEEP

    12288:mMrxy90901kzsDHty/zNpl6OwY+eh2FCHssQXjsq3V1yEdygMC/Yb:Py+01ltyLzlyYRYFKn01yHgMYo

Malware Config

Extracted

Family

redline

Botnet

daswa

C2

83.97.73.127:19062

Attributes
  • auth_value

    a6ab6b8df5480a0bb295d3c069f67bf8

Extracted

Family

redline

Botnet

mirko

C2

83.97.73.127:19062

Attributes
  • auth_value

    35111a095377107ec8b7d3e035831af8

Targets

    • Target

      3617ccf39b1fad4c20d03a58a85f72159bbdd31488ca1833f49081e3e1c77fd5

    • Size

      781KB

    • MD5

      adce23fcc0df4d8575bc3b4e0bdaecdd

    • SHA1

      a9f5427ead40aa75a7bad13d956caa45c8bdc16c

    • SHA256

      3617ccf39b1fad4c20d03a58a85f72159bbdd31488ca1833f49081e3e1c77fd5

    • SHA512

      4a8dc6183c8422ff4234f9782cf17b4449e6cae43183c7987ad48cd454cf04a5963627d70709b73540776314a33d14d2e8206189d139e59cf45fbb7c91627b6a

    • SSDEEP

      12288:mMrxy90901kzsDHty/zNpl6OwY+eh2FCHssQXjsq3V1yEdygMC/Yb:Py+01ltyLzlyYRYFKn01yHgMYo

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks