General

  • Target

    1c48ccc0824ee8121a2ac79e4632a8fb5f11e78206bba30ece7ff77dad3f8ddd

  • Size

    752KB

  • Sample

    230530-kvkxmagh7t

  • MD5

    f84a420cebd36e0165e36e50bdbb9a34

  • SHA1

    f71d0d3a91242309a65fe1d1faa372698874d138

  • SHA256

    1c48ccc0824ee8121a2ac79e4632a8fb5f11e78206bba30ece7ff77dad3f8ddd

  • SHA512

    bb7b2aa43226b45eaf06658d6832787fb94665556232e7b134a63847e75fde975418368276227bd78e9698f35a941a381af5019aa154a852d0b8b38355c51eef

  • SSDEEP

    12288:yMrSy90zlkFtp+dxtyffqWftUf5n7OoPxvYlWn9Hcw0Ztl44ygHKP4W7:syU+FtpryWftgSGTn6wItpyUFo

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.127:19045

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Extracted

Family

redline

Botnet

ronin

C2

83.97.73.127:19045

Attributes
  • auth_value

    4cce855f5ba9b9b6e5b1400f102745de

Targets

    • Target

      1c48ccc0824ee8121a2ac79e4632a8fb5f11e78206bba30ece7ff77dad3f8ddd

    • Size

      752KB

    • MD5

      f84a420cebd36e0165e36e50bdbb9a34

    • SHA1

      f71d0d3a91242309a65fe1d1faa372698874d138

    • SHA256

      1c48ccc0824ee8121a2ac79e4632a8fb5f11e78206bba30ece7ff77dad3f8ddd

    • SHA512

      bb7b2aa43226b45eaf06658d6832787fb94665556232e7b134a63847e75fde975418368276227bd78e9698f35a941a381af5019aa154a852d0b8b38355c51eef

    • SSDEEP

      12288:yMrSy90zlkFtp+dxtyffqWftUf5n7OoPxvYlWn9Hcw0Ztl44ygHKP4W7:syU+FtpryWftgSGTn6wItpyUFo

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks