General

  • Target

    91e147ad5a0e1ab556c5f0c63a2f097f1ba9a04617828e86646ebfcd0bb53823

  • Size

    752KB

  • Sample

    230530-t75l8sag39

  • MD5

    4901cc92be4068f9f8253f52025fb170

  • SHA1

    fb90b6d439ccb5d76b0aef7fa0c159cbfa51affb

  • SHA256

    91e147ad5a0e1ab556c5f0c63a2f097f1ba9a04617828e86646ebfcd0bb53823

  • SHA512

    7f15e70bd1cafb0f0b9349c264d0da5aa6921b7a11ef889ff840e34e12fa268056e32768dd54306114944d774c63ba5e6f658f7459a01955cf68ff1d8af4ab2b

  • SSDEEP

    12288:EMrJy90urfbT2x06vZZXm6q80ndWurESqcrHMVSnwA3u6QmAEpfikkVOQrwz/MQ:NypwhOzdW9J7VSwgZQ9Ep36OQrwz/MQ

Malware Config

Extracted

Family

redline

Botnet

dusa

C2

83.97.73.127:19045

Attributes
  • auth_value

    ee896466545fedf9de5406175fb82de5

Extracted

Family

redline

Botnet

ronin

C2

83.97.73.127:19045

Attributes
  • auth_value

    4cce855f5ba9b9b6e5b1400f102745de

Targets

    • Target

      91e147ad5a0e1ab556c5f0c63a2f097f1ba9a04617828e86646ebfcd0bb53823

    • Size

      752KB

    • MD5

      4901cc92be4068f9f8253f52025fb170

    • SHA1

      fb90b6d439ccb5d76b0aef7fa0c159cbfa51affb

    • SHA256

      91e147ad5a0e1ab556c5f0c63a2f097f1ba9a04617828e86646ebfcd0bb53823

    • SHA512

      7f15e70bd1cafb0f0b9349c264d0da5aa6921b7a11ef889ff840e34e12fa268056e32768dd54306114944d774c63ba5e6f658f7459a01955cf68ff1d8af4ab2b

    • SSDEEP

      12288:EMrJy90urfbT2x06vZZXm6q80ndWurESqcrHMVSnwA3u6QmAEpfikkVOQrwz/MQ:NypwhOzdW9J7VSwgZQ9Ep36OQrwz/MQ

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks