General

  • Target

    9873aae3edf416faad0c03794713e067e5cebdb0191588f19793ecaec0fc2f85

  • Size

    754KB

  • Sample

    230529-25e8kaec6z

  • MD5

    5ae493aff9cffb95b385b02a2ba830a3

  • SHA1

    5d20b6ca267e17ac3722b5fd4a4a437e1d3396c3

  • SHA256

    9873aae3edf416faad0c03794713e067e5cebdb0191588f19793ecaec0fc2f85

  • SHA512

    6d51b59024cbfc8ea96618e8e88cd7234f7db78404517b5fe27eabe5ef8f20aee914ade8f23551a695b58d7145e2c8cffb81be492fa531fd9126b86f4aecd09f

  • SSDEEP

    12288:eMrSy90cH1Tj+VQ8oJgNpk0K+jZqvtcvEQ0YtkyLfcA8QU+04H3PZ/vkqjCVYGz:QypTj0QfJgNej+Uvtc8QXfl3PNsqjC28

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.127:19045

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Extracted

Family

redline

Botnet

ronin

C2

83.97.73.127:19045

Attributes
  • auth_value

    4cce855f5ba9b9b6e5b1400f102745de

Targets

    • Target

      9873aae3edf416faad0c03794713e067e5cebdb0191588f19793ecaec0fc2f85

    • Size

      754KB

    • MD5

      5ae493aff9cffb95b385b02a2ba830a3

    • SHA1

      5d20b6ca267e17ac3722b5fd4a4a437e1d3396c3

    • SHA256

      9873aae3edf416faad0c03794713e067e5cebdb0191588f19793ecaec0fc2f85

    • SHA512

      6d51b59024cbfc8ea96618e8e88cd7234f7db78404517b5fe27eabe5ef8f20aee914ade8f23551a695b58d7145e2c8cffb81be492fa531fd9126b86f4aecd09f

    • SSDEEP

      12288:eMrSy90cH1Tj+VQ8oJgNpk0K+jZqvtcvEQ0YtkyLfcA8QU+04H3PZ/vkqjCVYGz:QypTj0QfJgNej+Uvtc8QXfl3PNsqjC28

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks