General

  • Target

    b75edfd0143510c8745c32d08fe7e3539f4048ce7eacafb7ab3c338c23e7a669

  • Size

    807KB

  • Sample

    230528-zr631sge52

  • MD5

    b95d14edfa67edc4a77993a718dc9836

  • SHA1

    7e8ce82425462b29c630649083b2df9c892bddbc

  • SHA256

    b75edfd0143510c8745c32d08fe7e3539f4048ce7eacafb7ab3c338c23e7a669

  • SHA512

    464649eb4e38d2e598cac3b25816eddd334020472f8863865b6bf6dde7628cbaef289dc721287a14761c6abdad10c4480bc6631511378bdb4425a028ab13a7dc

  • SSDEEP

    12288:lMrh2y90JMWFyO6/LlbawqViVKj0Ht9INz4cRD2hmbp5erkFifg1heT0nDEQ3USn:y2ySMWn4Lt9VKj0HIHF1newnI6USn

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.127:19045

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Extracted

Family

redline

Botnet

metro

C2

83.97.73.127:19045

Attributes
  • auth_value

    f7fd4aa816bdbaad933b45b51d9b6b1a

Targets

    • Target

      b75edfd0143510c8745c32d08fe7e3539f4048ce7eacafb7ab3c338c23e7a669

    • Size

      807KB

    • MD5

      b95d14edfa67edc4a77993a718dc9836

    • SHA1

      7e8ce82425462b29c630649083b2df9c892bddbc

    • SHA256

      b75edfd0143510c8745c32d08fe7e3539f4048ce7eacafb7ab3c338c23e7a669

    • SHA512

      464649eb4e38d2e598cac3b25816eddd334020472f8863865b6bf6dde7628cbaef289dc721287a14761c6abdad10c4480bc6631511378bdb4425a028ab13a7dc

    • SSDEEP

      12288:lMrh2y90JMWFyO6/LlbawqViVKj0Ht9INz4cRD2hmbp5erkFifg1heT0nDEQ3USn:y2ySMWn4Lt9VKj0HIHF1newnI6USn

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks