General

  • Target

    0ecdac3e6fef70443cb16bfb9cf0f4b8948db27364a12f004063f1b847280d40

  • Size

    804KB

  • Sample

    230529-cfb26shb56

  • MD5

    5e2f5e5e322138fcac1219ffacdac589

  • SHA1

    0da0ca5b77d4a522fde26db3aa710baf5b1a1fb5

  • SHA256

    0ecdac3e6fef70443cb16bfb9cf0f4b8948db27364a12f004063f1b847280d40

  • SHA512

    37935c5055b8f068d21aab4fd6fe4f92cd257e0b6f0cca826b51f6df67b71e42eeb5956fdaa6075fc44573011b7011c2f13bc4b52b9b092a8a6d27d19c1059d6

  • SSDEEP

    24576:NyxCIh25CtYS+NEI4OL0T9Le+nF6USZI:oG4GSwEEL8Y+nFu

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.127:19045

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Extracted

Family

redline

Botnet

metro

C2

83.97.73.127:19045

Attributes
  • auth_value

    f7fd4aa816bdbaad933b45b51d9b6b1a

Targets

    • Target

      0ecdac3e6fef70443cb16bfb9cf0f4b8948db27364a12f004063f1b847280d40

    • Size

      804KB

    • MD5

      5e2f5e5e322138fcac1219ffacdac589

    • SHA1

      0da0ca5b77d4a522fde26db3aa710baf5b1a1fb5

    • SHA256

      0ecdac3e6fef70443cb16bfb9cf0f4b8948db27364a12f004063f1b847280d40

    • SHA512

      37935c5055b8f068d21aab4fd6fe4f92cd257e0b6f0cca826b51f6df67b71e42eeb5956fdaa6075fc44573011b7011c2f13bc4b52b9b092a8a6d27d19c1059d6

    • SSDEEP

      24576:NyxCIh25CtYS+NEI4OL0T9Le+nF6USZI:oG4GSwEEL8Y+nFu

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks