General

  • Target

    c29271f2b8342c96bccb52eb587960394779ba3f459f6f1a1ee27f03e6f87261

  • Size

    753KB

  • Sample

    230530-bm5sdseg2y

  • MD5

    e4bf7498b2ceed3f989e07240a74a36c

  • SHA1

    447ffad1dfdad9ed4f4460868c9385889fc62cec

  • SHA256

    c29271f2b8342c96bccb52eb587960394779ba3f459f6f1a1ee27f03e6f87261

  • SHA512

    22a30890bed6286557224690e18e638df6c11c9b5b0803cdd92c14c49ab84c75cd4afe53701bd1d38d76a0195f8f74f35c68a716996a8a35d95915854fb1d710

  • SSDEEP

    12288:VMr3y90CrwqjR4ZDLVD99hZnbME+nNPoE4d5VpqzqoBCZ/WkfmNZi/+/14BB:6yTDjALZh1ApNPoEsvQCxWlDC

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.127:19045

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Extracted

Family

redline

Botnet

ronin

C2

83.97.73.127:19045

Attributes
  • auth_value

    4cce855f5ba9b9b6e5b1400f102745de

Targets

    • Target

      c29271f2b8342c96bccb52eb587960394779ba3f459f6f1a1ee27f03e6f87261

    • Size

      753KB

    • MD5

      e4bf7498b2ceed3f989e07240a74a36c

    • SHA1

      447ffad1dfdad9ed4f4460868c9385889fc62cec

    • SHA256

      c29271f2b8342c96bccb52eb587960394779ba3f459f6f1a1ee27f03e6f87261

    • SHA512

      22a30890bed6286557224690e18e638df6c11c9b5b0803cdd92c14c49ab84c75cd4afe53701bd1d38d76a0195f8f74f35c68a716996a8a35d95915854fb1d710

    • SSDEEP

      12288:VMr3y90CrwqjR4ZDLVD99hZnbME+nNPoE4d5VpqzqoBCZ/WkfmNZi/+/14BB:6yTDjALZh1ApNPoEsvQCxWlDC

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks