General

  • Target

    e4a8eee27b5c09158990d6bdb15107a9a6256d24c62a0ccc77fe4f34dbdb299d

  • Size

    1.0MB

  • Sample

    230529-kefmzaag35

  • MD5

    7d615f71b1ef84c3fa8609124966c607

  • SHA1

    e1eff12a1a374eb1e79c8f9108a42ecd440cf70d

  • SHA256

    e4a8eee27b5c09158990d6bdb15107a9a6256d24c62a0ccc77fe4f34dbdb299d

  • SHA512

    a76777a921d15ee307500ae51b9eb3b8584f8a4fb7e2986e3acf0270ec9af6622747455b9def6f118829a60c299c3a8ae1309ebe42c94fecd1ebc99f15b223a4

  • SSDEEP

    24576:FyYE3gV8XKt7LuKT69RMUK0ib3XQLPp9ZT+bKVhMXSEsXDzBbKQf:gYE3lS7KKT69P8rgbp9l8KXMibDzBu

Malware Config

Extracted

Family

redline

Botnet

lizsa

C2

83.97.73.127:19045

Attributes
  • auth_value

    44b0b71b36e78465dbdebb4ecfb78b77

Extracted

Family

redline

Botnet

metro

C2

83.97.73.127:19045

Attributes
  • auth_value

    f7fd4aa816bdbaad933b45b51d9b6b1a

Targets

    • Target

      e4a8eee27b5c09158990d6bdb15107a9a6256d24c62a0ccc77fe4f34dbdb299d

    • Size

      1.0MB

    • MD5

      7d615f71b1ef84c3fa8609124966c607

    • SHA1

      e1eff12a1a374eb1e79c8f9108a42ecd440cf70d

    • SHA256

      e4a8eee27b5c09158990d6bdb15107a9a6256d24c62a0ccc77fe4f34dbdb299d

    • SHA512

      a76777a921d15ee307500ae51b9eb3b8584f8a4fb7e2986e3acf0270ec9af6622747455b9def6f118829a60c299c3a8ae1309ebe42c94fecd1ebc99f15b223a4

    • SSDEEP

      24576:FyYE3gV8XKt7LuKT69RMUK0ib3XQLPp9ZT+bKVhMXSEsXDzBbKQf:gYE3lS7KKT69P8rgbp9l8KXMibDzBu

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks