General

  • Target

    1bd7c9f612f18588a504001ddc8c0f117a1402cf6231b01e6337877b7d09cf59

  • Size

    751KB

  • Sample

    230530-ltwheahb6v

  • MD5

    219be49b8ccafd9ef0bd25da674c3680

  • SHA1

    a0faa3bbd7ca66095998227dc17ee735b0e21d2e

  • SHA256

    1bd7c9f612f18588a504001ddc8c0f117a1402cf6231b01e6337877b7d09cf59

  • SHA512

    a769bc2cc7b82f46330457902f6c6cb4ceb4852cdc0a91190858b2d97fb2a010ef5c18df84b98e5b5c5ec7d87569d02757d79ee3109ea3331e9d02877efb6699

  • SSDEEP

    12288:UMrsy90IxhkE+JW0a+5hwqgFe2/cgTM/CwAvIZ2Ds2Kz9lfHsYG874c2P/8:gy6DP+/czClY+/OHHst02P/8

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.127:19045

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Extracted

Family

redline

Botnet

ronin

C2

83.97.73.127:19045

Attributes
  • auth_value

    4cce855f5ba9b9b6e5b1400f102745de

Targets

    • Target

      1bd7c9f612f18588a504001ddc8c0f117a1402cf6231b01e6337877b7d09cf59

    • Size

      751KB

    • MD5

      219be49b8ccafd9ef0bd25da674c3680

    • SHA1

      a0faa3bbd7ca66095998227dc17ee735b0e21d2e

    • SHA256

      1bd7c9f612f18588a504001ddc8c0f117a1402cf6231b01e6337877b7d09cf59

    • SHA512

      a769bc2cc7b82f46330457902f6c6cb4ceb4852cdc0a91190858b2d97fb2a010ef5c18df84b98e5b5c5ec7d87569d02757d79ee3109ea3331e9d02877efb6699

    • SSDEEP

      12288:UMrsy90IxhkE+JW0a+5hwqgFe2/cgTM/CwAvIZ2Ds2Kz9lfHsYG874c2P/8:gy6DP+/czClY+/OHHst02P/8

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks