General

  • Target

    ce802f94d87648b26c104960a40e4c535a4ad2e6d5221eb66d95c365995510f2

  • Size

    781KB

  • Sample

    230528-q114pafb95

  • MD5

    e854aff8fe3269518270bd130503eaa5

  • SHA1

    a8408ab245e81afb78315e8e9a364d21dcf08f49

  • SHA256

    ce802f94d87648b26c104960a40e4c535a4ad2e6d5221eb66d95c365995510f2

  • SHA512

    f84da38a99bd6193fc680724daabc054dc8b8beaafe45853d2f05c8d237988fb9792a6eb2bc27e6193a95a6d2441c3017e473aa7aacc8de77b8018ec3700079d

  • SSDEEP

    12288:FMrby90fa+jxGsNyeaLlfhAqNiDjN4BrjovHUfhBjkdMlgiTBQbjakMCiVsm1omG:+yyaSyeaLlJQ+HiULId+tmbukMxxlG

Malware Config

Extracted

Family

redline

Botnet

daswa

C2

83.97.73.127:19062

Attributes
  • auth_value

    a6ab6b8df5480a0bb295d3c069f67bf8

Extracted

Family

redline

Botnet

mirko

C2

83.97.73.127:19062

Attributes
  • auth_value

    35111a095377107ec8b7d3e035831af8

Targets

    • Target

      ce802f94d87648b26c104960a40e4c535a4ad2e6d5221eb66d95c365995510f2

    • Size

      781KB

    • MD5

      e854aff8fe3269518270bd130503eaa5

    • SHA1

      a8408ab245e81afb78315e8e9a364d21dcf08f49

    • SHA256

      ce802f94d87648b26c104960a40e4c535a4ad2e6d5221eb66d95c365995510f2

    • SHA512

      f84da38a99bd6193fc680724daabc054dc8b8beaafe45853d2f05c8d237988fb9792a6eb2bc27e6193a95a6d2441c3017e473aa7aacc8de77b8018ec3700079d

    • SSDEEP

      12288:FMrby90fa+jxGsNyeaLlfhAqNiDjN4BrjovHUfhBjkdMlgiTBQbjakMCiVsm1omG:+yyaSyeaLlJQ+HiULId+tmbukMxxlG

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

2
T1112

Disabling Security Tools

1
T1089

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks