General

  • Target

    8257c815de1a0dcbf2d1877f55b826404c877fb32109ec74990ec8971b63b843

  • Size

    788KB

  • Sample

    230529-lzz3sabf8v

  • MD5

    d0bee81b7391d41b9aa5285837c6b2b7

  • SHA1

    4092630dd3b7a8986075919a7778f3fb07b2e9b5

  • SHA256

    8257c815de1a0dcbf2d1877f55b826404c877fb32109ec74990ec8971b63b843

  • SHA512

    6edce69d99fde31e1d28bda0637d2e82ece255a57dae6c5fd0d2f11d9b9c3edfa208c85458220ce9f89defbf3650d5002b9e842c05d2687c451e78734dfb2ab2

  • SSDEEP

    12288:SMr7y90oaQ8vU+ocvfv2VqjH6xLLN8rlT5F0xmstWZGLGbw+7ZucxRAw/4:JyQU+vaxvN8h5FIm6LGU+7ZuIPA

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.127:19045

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Extracted

Family

redline

Botnet

metro

C2

83.97.73.127:19045

Attributes
  • auth_value

    f7fd4aa816bdbaad933b45b51d9b6b1a

Targets

    • Target

      8257c815de1a0dcbf2d1877f55b826404c877fb32109ec74990ec8971b63b843

    • Size

      788KB

    • MD5

      d0bee81b7391d41b9aa5285837c6b2b7

    • SHA1

      4092630dd3b7a8986075919a7778f3fb07b2e9b5

    • SHA256

      8257c815de1a0dcbf2d1877f55b826404c877fb32109ec74990ec8971b63b843

    • SHA512

      6edce69d99fde31e1d28bda0637d2e82ece255a57dae6c5fd0d2f11d9b9c3edfa208c85458220ce9f89defbf3650d5002b9e842c05d2687c451e78734dfb2ab2

    • SSDEEP

      12288:SMr7y90oaQ8vU+ocvfv2VqjH6xLLN8rlT5F0xmstWZGLGbw+7ZucxRAw/4:JyQU+vaxvN8h5FIm6LGU+7ZuIPA

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks