General

  • Target

    8cc5a1035c5ed06bbec20e34757fa0a1e8288a48d4bfd0c5a53c9857d3a8f7a5

  • Size

    755KB

  • Sample

    230529-21l6badh48

  • MD5

    9f5d9eb5913941de41d179c85dad2dbd

  • SHA1

    c773d5ccd0c34989fa39d82c4454801b5625f66f

  • SHA256

    8cc5a1035c5ed06bbec20e34757fa0a1e8288a48d4bfd0c5a53c9857d3a8f7a5

  • SHA512

    9a8e00b764a355096d95a25df040f6ceac295afb58799d8424a748530533b974a9c4647cb16e130dee67071186f54ae1e83a3beb98fd7acb667910bb649f4d37

  • SSDEEP

    12288:JMrwy90ibZcLZB/jZAITyYNGx2JsGVE0HQ054jfvyQE99EXVxikLJd7dt:RyyZBahj6rVDHhazqB9EXLik3P

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.127:19045

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Extracted

Family

redline

Botnet

ronin

C2

83.97.73.127:19045

Attributes
  • auth_value

    4cce855f5ba9b9b6e5b1400f102745de

Targets

    • Target

      8cc5a1035c5ed06bbec20e34757fa0a1e8288a48d4bfd0c5a53c9857d3a8f7a5

    • Size

      755KB

    • MD5

      9f5d9eb5913941de41d179c85dad2dbd

    • SHA1

      c773d5ccd0c34989fa39d82c4454801b5625f66f

    • SHA256

      8cc5a1035c5ed06bbec20e34757fa0a1e8288a48d4bfd0c5a53c9857d3a8f7a5

    • SHA512

      9a8e00b764a355096d95a25df040f6ceac295afb58799d8424a748530533b974a9c4647cb16e130dee67071186f54ae1e83a3beb98fd7acb667910bb649f4d37

    • SSDEEP

      12288:JMrwy90ibZcLZB/jZAITyYNGx2JsGVE0HQ054jfvyQE99EXVxikLJd7dt:RyyZBahj6rVDHhazqB9EXLik3P

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks