General

  • Target

    bf93f72a99b0e4566df09b76c8c31ccb672450209828e0341165380f2af8e89e

  • Size

    731KB

  • Sample

    230531-j78zjsdg38

  • MD5

    f3fae10309721b190ebff5529a53c521

  • SHA1

    495a52d1f1c738a701d82e69483303169f3e458f

  • SHA256

    bf93f72a99b0e4566df09b76c8c31ccb672450209828e0341165380f2af8e89e

  • SHA512

    c694f363c909a0550716519b9ba083fdb40010d9049838ec8ebafcf1ffecf48deae2dfd30d890a650eb10d196336c32ea3c8d8e7e0c16fffb75c405bacbbdb92

  • SSDEEP

    12288:rMroy90tL+KthRdgAtk6VxowRPopcBRGIfTDUcDq56ywc2kXrrgIekoaKFRAZOw:7yCntk6pwpWpfTHDMwc2kXrsSlZOw

Malware Config

Extracted

Family

redline

Botnet

dusa

C2

83.97.73.127:19045

Attributes
  • auth_value

    ee896466545fedf9de5406175fb82de5

Extracted

Family

redline

Botnet

tinda

C2

83.97.73.127:19045

Attributes
  • auth_value

    88da3924455f4ba3a1b76cd03af918bb

Targets

    • Target

      bf93f72a99b0e4566df09b76c8c31ccb672450209828e0341165380f2af8e89e

    • Size

      731KB

    • MD5

      f3fae10309721b190ebff5529a53c521

    • SHA1

      495a52d1f1c738a701d82e69483303169f3e458f

    • SHA256

      bf93f72a99b0e4566df09b76c8c31ccb672450209828e0341165380f2af8e89e

    • SHA512

      c694f363c909a0550716519b9ba083fdb40010d9049838ec8ebafcf1ffecf48deae2dfd30d890a650eb10d196336c32ea3c8d8e7e0c16fffb75c405bacbbdb92

    • SSDEEP

      12288:rMroy90tL+KthRdgAtk6VxowRPopcBRGIfTDUcDq56ywc2kXrrgIekoaKFRAZOw:7yCntk6pwpWpfTHDMwc2kXrsSlZOw

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks