General

  • Target

    76f2acdd50625f4eb7fecd11d26a2a9d4d565fc83df5b04c091e06737c682373

  • Size

    1.0MB

  • Sample

    230530-v4w2csbc7z

  • MD5

    1592fbc7d9f8da8a1becb25328e941cc

  • SHA1

    bf2408d2e338fc0b654d5963818f6988b1a3ba0f

  • SHA256

    76f2acdd50625f4eb7fecd11d26a2a9d4d565fc83df5b04c091e06737c682373

  • SHA512

    64ad740de3c5942b5a8d22bce4327ae05862a171546c10f86ddabcc6e62d0bb6eb7d7a5c8753a9056648c81c598f1fb07c214c69b313cd0c360935b58e69e031

  • SSDEEP

    24576:Zy/adxT9GbigTMbdvYmt3SmdmIE72sUg/w4wj2u8fQJm2Tdaw:MSd7GmthjcImICNUgQjt8fQX

Malware Config

Extracted

Family

redline

Botnet

lusa

C2

83.97.73.127:19045

Attributes
  • auth_value

    c9df946711e01c378b42221de692acbd

Extracted

Family

redline

Botnet

ronin

C2

83.97.73.127:19045

Attributes
  • auth_value

    4cce855f5ba9b9b6e5b1400f102745de

Targets

    • Target

      76f2acdd50625f4eb7fecd11d26a2a9d4d565fc83df5b04c091e06737c682373

    • Size

      1.0MB

    • MD5

      1592fbc7d9f8da8a1becb25328e941cc

    • SHA1

      bf2408d2e338fc0b654d5963818f6988b1a3ba0f

    • SHA256

      76f2acdd50625f4eb7fecd11d26a2a9d4d565fc83df5b04c091e06737c682373

    • SHA512

      64ad740de3c5942b5a8d22bce4327ae05862a171546c10f86ddabcc6e62d0bb6eb7d7a5c8753a9056648c81c598f1fb07c214c69b313cd0c360935b58e69e031

    • SSDEEP

      24576:Zy/adxT9GbigTMbdvYmt3SmdmIE72sUg/w4wj2u8fQJm2Tdaw:MSd7GmthjcImICNUgQjt8fQX

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks