Resubmissions

29/05/2023, 00:21

230529-anm4asgh79 10

General

  • Target

    2c66234b9da7d38b672802f73954bb705fa6957e52602291c9bc15502f78f29a

  • Size

    804KB

  • Sample

    230529-anm4asgh79

  • MD5

    4b06fd9edeb3c240e4f981e5e4c6eb72

  • SHA1

    efa8887e3dc1374d6d44bc9a89d86a4f5ca3247f

  • SHA256

    2c66234b9da7d38b672802f73954bb705fa6957e52602291c9bc15502f78f29a

  • SHA512

    226d665ee86e439d76077a606237bd6d9d0faa0fd40175aa8a4d07504f9903887aa7dccf64b1bc215821d12fdfa6460128e74233c9f7c6c6c703cfa8d2736a84

  • SSDEEP

    12288:NMr5y90qrzfGjgh2yofF3iH0H88L7jk6BM83lelCidFLGxsf2bheeBnwEQ3UStxh:wyr+qBm0d8L7Xlebns9eenZ6UStjP

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.127:19045

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Extracted

Family

redline

Botnet

metro

C2

83.97.73.127:19045

Attributes
  • auth_value

    f7fd4aa816bdbaad933b45b51d9b6b1a

Targets

    • Target

      2c66234b9da7d38b672802f73954bb705fa6957e52602291c9bc15502f78f29a

    • Size

      804KB

    • MD5

      4b06fd9edeb3c240e4f981e5e4c6eb72

    • SHA1

      efa8887e3dc1374d6d44bc9a89d86a4f5ca3247f

    • SHA256

      2c66234b9da7d38b672802f73954bb705fa6957e52602291c9bc15502f78f29a

    • SHA512

      226d665ee86e439d76077a606237bd6d9d0faa0fd40175aa8a4d07504f9903887aa7dccf64b1bc215821d12fdfa6460128e74233c9f7c6c6c703cfa8d2736a84

    • SSDEEP

      12288:NMr5y90qrzfGjgh2yofF3iH0H88L7jk6BM83lelCidFLGxsf2bheeBnwEQ3UStxh:wyr+qBm0d8L7Xlebns9eenZ6UStjP

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks