General

  • Target

    0476c61d281f6f4f5f6d25fec7019abfc1c5a817f87ff42cb71f01cc374c50fe

  • Size

    752KB

  • Sample

    230530-yx89wsbh6y

  • MD5

    7993ceee4c2524d47d8984146b4bd2cd

  • SHA1

    11328114f191d94b6c0ec811a344bc195283113c

  • SHA256

    0476c61d281f6f4f5f6d25fec7019abfc1c5a817f87ff42cb71f01cc374c50fe

  • SHA512

    497678c545a0fd62377112d77465d436fdf76082cd7c4f9f96c07ca8e4c139e072ceb9d9f474c6c567140dc04a310ee84b3ecd785db47f574d6389af589df675

  • SSDEEP

    12288:lMrzy90ffQAey1kQyUqYaurESqOTvDcHngdMG0yANMqtOjms3a8R:ayK4ffYa9JOTrcHS1t37R

Malware Config

Extracted

Family

redline

Botnet

dusa

C2

83.97.73.127:19045

Attributes
  • auth_value

    ee896466545fedf9de5406175fb82de5

Extracted

Family

redline

Botnet

ronin

C2

83.97.73.127:19045

Attributes
  • auth_value

    4cce855f5ba9b9b6e5b1400f102745de

Targets

    • Target

      0476c61d281f6f4f5f6d25fec7019abfc1c5a817f87ff42cb71f01cc374c50fe

    • Size

      752KB

    • MD5

      7993ceee4c2524d47d8984146b4bd2cd

    • SHA1

      11328114f191d94b6c0ec811a344bc195283113c

    • SHA256

      0476c61d281f6f4f5f6d25fec7019abfc1c5a817f87ff42cb71f01cc374c50fe

    • SHA512

      497678c545a0fd62377112d77465d436fdf76082cd7c4f9f96c07ca8e4c139e072ceb9d9f474c6c567140dc04a310ee84b3ecd785db47f574d6389af589df675

    • SSDEEP

      12288:lMrzy90ffQAey1kQyUqYaurESqOTvDcHngdMG0yANMqtOjms3a8R:ayK4ffYa9JOTrcHS1t37R

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks