General

  • Target

    6a8930c3861ca5bdb1be402dc6fb90fdbbef51bc4efa336bf2f05ffcf53a528c

  • Size

    751KB

  • Sample

    230530-za474aca2x

  • MD5

    7c1cf61b4977fd40d8c2ec8b21a1af71

  • SHA1

    f2c2571493d0bda38fff462c597b5eb236a2d331

  • SHA256

    6a8930c3861ca5bdb1be402dc6fb90fdbbef51bc4efa336bf2f05ffcf53a528c

  • SHA512

    fdff574f6d7f40e18940f7130427ec72dd3fa7a1b4145ee714d7da013feb3b2d8fccc2b4f148aa558828e48a9188a57a3b9d5cd674eff02197dde4d435efcc65

  • SSDEEP

    12288:6Mrpy90krNBbKaU0bPJ+P9drESq6p4yEFUQRaRDoGAqqmsweuoWyZumCd72YNUBq:7yZ3NoP9OJ6iZRa5A8KuaZda2YNq8bR

Malware Config

Extracted

Family

redline

Botnet

dusa

C2

83.97.73.127:19045

Attributes
  • auth_value

    ee896466545fedf9de5406175fb82de5

Extracted

Family

redline

Botnet

ronin

C2

83.97.73.127:19045

Attributes
  • auth_value

    4cce855f5ba9b9b6e5b1400f102745de

Targets

    • Target

      6a8930c3861ca5bdb1be402dc6fb90fdbbef51bc4efa336bf2f05ffcf53a528c

    • Size

      751KB

    • MD5

      7c1cf61b4977fd40d8c2ec8b21a1af71

    • SHA1

      f2c2571493d0bda38fff462c597b5eb236a2d331

    • SHA256

      6a8930c3861ca5bdb1be402dc6fb90fdbbef51bc4efa336bf2f05ffcf53a528c

    • SHA512

      fdff574f6d7f40e18940f7130427ec72dd3fa7a1b4145ee714d7da013feb3b2d8fccc2b4f148aa558828e48a9188a57a3b9d5cd674eff02197dde4d435efcc65

    • SSDEEP

      12288:6Mrpy90krNBbKaU0bPJ+P9drESq6p4yEFUQRaRDoGAqqmsweuoWyZumCd72YNUBq:7yZ3NoP9OJ6iZRa5A8KuaZda2YNq8bR

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks