General

  • Target

    705144b176925c6ff1fc6a3a42051fff251e6022f1e02f214a775a7fa83a2487

  • Size

    806KB

  • Sample

    230529-c6j6gahg61

  • MD5

    394d0c1aae1dd12da9840dfa029c6efd

  • SHA1

    4e37b42059cee761082d40431d49dc3d8a5f5ccf

  • SHA256

    705144b176925c6ff1fc6a3a42051fff251e6022f1e02f214a775a7fa83a2487

  • SHA512

    b0ca4525a801db5e169329279f2c7a2ce13265205558bf6dd7669dbd55e26a1eaa3964aa6a310dbe5786ecfe27cc42e697841d75842a744f721ec5597f62d2e3

  • SSDEEP

    24576:NyQADFr2AiZPmCMeUsaQqDeInr6US/LSh:oQAprcZP5amInrELS

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.127:19045

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Extracted

Family

redline

Botnet

metro

C2

83.97.73.127:19045

Attributes
  • auth_value

    f7fd4aa816bdbaad933b45b51d9b6b1a

Targets

    • Target

      705144b176925c6ff1fc6a3a42051fff251e6022f1e02f214a775a7fa83a2487

    • Size

      806KB

    • MD5

      394d0c1aae1dd12da9840dfa029c6efd

    • SHA1

      4e37b42059cee761082d40431d49dc3d8a5f5ccf

    • SHA256

      705144b176925c6ff1fc6a3a42051fff251e6022f1e02f214a775a7fa83a2487

    • SHA512

      b0ca4525a801db5e169329279f2c7a2ce13265205558bf6dd7669dbd55e26a1eaa3964aa6a310dbe5786ecfe27cc42e697841d75842a744f721ec5597f62d2e3

    • SSDEEP

      24576:NyQADFr2AiZPmCMeUsaQqDeInr6US/LSh:oQAprcZP5amInrELS

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks