General

  • Target

    9f9478d7e59879fb9d6c033f4bb58e3e04df9eaa19599123800a57645247b0e1

  • Size

    780KB

  • Sample

    230528-qtnj1sff4z

  • MD5

    9b2f5f7f5083c2f017ff1d812e3f183f

  • SHA1

    ea5841fff457e6aba09ee23201b2c5460605dbd9

  • SHA256

    9f9478d7e59879fb9d6c033f4bb58e3e04df9eaa19599123800a57645247b0e1

  • SHA512

    1a929d5e9055d5970238a20840369e4bfe38ec597ca30f18ab1fa0a02382f0b183b3c07e7c7f03cd3eef8a3a05473cb787e5a8ccb82b4bcab9eaff976f43a4df

  • SSDEEP

    12288:DMrAy90ZWjnH8tn5upeDtTDF66sXZNh1wLb50wtgEkkh8OX2xvalc2NdJQjubeeE:vyDj0n5upeRH4XDh1wR0DkSDWFNhab

Malware Config

Extracted

Family

redline

Botnet

daswa

C2

83.97.73.127:19062

Attributes
  • auth_value

    a6ab6b8df5480a0bb295d3c069f67bf8

Extracted

Family

redline

Botnet

mirko

C2

83.97.73.127:19062

Attributes
  • auth_value

    35111a095377107ec8b7d3e035831af8

Targets

    • Target

      9f9478d7e59879fb9d6c033f4bb58e3e04df9eaa19599123800a57645247b0e1

    • Size

      780KB

    • MD5

      9b2f5f7f5083c2f017ff1d812e3f183f

    • SHA1

      ea5841fff457e6aba09ee23201b2c5460605dbd9

    • SHA256

      9f9478d7e59879fb9d6c033f4bb58e3e04df9eaa19599123800a57645247b0e1

    • SHA512

      1a929d5e9055d5970238a20840369e4bfe38ec597ca30f18ab1fa0a02382f0b183b3c07e7c7f03cd3eef8a3a05473cb787e5a8ccb82b4bcab9eaff976f43a4df

    • SSDEEP

      12288:DMrAy90ZWjnH8tn5upeDtTDF66sXZNh1wLb50wtgEkkh8OX2xvalc2NdJQjubeeE:vyDj0n5upeRH4XDh1wR0DkSDWFNhab

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

2
T1112

Disabling Security Tools

1
T1089

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks