General

  • Target

    37d0b2987365d20112a91aab8203f818b51d2c4734ca633ed8c101703fd92736

  • Size

    788KB

  • Sample

    230529-xjkhyadb35

  • MD5

    1d019e6afd2d2c8c225403d20287ebc5

  • SHA1

    5cda130ecc8e8bd8f3d90ba54846d7312f5db169

  • SHA256

    37d0b2987365d20112a91aab8203f818b51d2c4734ca633ed8c101703fd92736

  • SHA512

    5226ae2b9d7828bd009a3d0bc4ba360f8a1cb265b3b56d691258fcf2dd58805139f1c36b5f828b81b2225adfe140cf32f94b1470a095edba93d8ca23ccfdd0fe

  • SSDEEP

    12288:sMr/y90+4Hgyrlx3pfRpdMrNgJMFyBR2VAl2sPX2uCxRBf9j:7y4Pb3hDi2aFyBRlv0BFj

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.127:19045

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Extracted

Family

redline

Botnet

metro

C2

83.97.73.127:19045

Attributes
  • auth_value

    f7fd4aa816bdbaad933b45b51d9b6b1a

Targets

    • Target

      37d0b2987365d20112a91aab8203f818b51d2c4734ca633ed8c101703fd92736

    • Size

      788KB

    • MD5

      1d019e6afd2d2c8c225403d20287ebc5

    • SHA1

      5cda130ecc8e8bd8f3d90ba54846d7312f5db169

    • SHA256

      37d0b2987365d20112a91aab8203f818b51d2c4734ca633ed8c101703fd92736

    • SHA512

      5226ae2b9d7828bd009a3d0bc4ba360f8a1cb265b3b56d691258fcf2dd58805139f1c36b5f828b81b2225adfe140cf32f94b1470a095edba93d8ca23ccfdd0fe

    • SSDEEP

      12288:sMr/y90+4Hgyrlx3pfRpdMrNgJMFyBR2VAl2sPX2uCxRBf9j:7y4Pb3hDi2aFyBRlv0BFj

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks