General

  • Target

    8f37f9b63ada8196cf3dbad45df959d1e6771acdb9dd4e2d44e7073cb329e26d

  • Size

    731KB

  • Sample

    230531-mxsrcsed32

  • MD5

    a7c02752be70fdf740107a6b42e54536

  • SHA1

    f72ce700343a95c71613f88a3425d2967a48d5ae

  • SHA256

    8f37f9b63ada8196cf3dbad45df959d1e6771acdb9dd4e2d44e7073cb329e26d

  • SHA512

    8cd191bd31b4580b39f243a2075398da43d57ecfdad94fbcb64bf1cde5b6fbcbd326916ef1502caf710a3238a5298b76ea5345e002cd0caa8267034e7d324412

  • SSDEEP

    12288:GMrVy90wO//HiILE+BYG0vHSWKhTpC1zsI5hj0EdQEUdki4FhU8OUSR:byan/LHBYGSHbKhtCNsI5hj0qQ3n4FGx

Malware Config

Extracted

Family

redline

Botnet

dars

C2

83.97.73.127:19045

Attributes
  • auth_value

    7cd208e6b6c927262304d5d4d88647fd

Extracted

Family

redline

Botnet

nitro

C2

83.97.73.127:19045

Attributes
  • auth_value

    1b68cf84b9b046f28b71cb39e44aa0e4

Targets

    • Target

      8f37f9b63ada8196cf3dbad45df959d1e6771acdb9dd4e2d44e7073cb329e26d

    • Size

      731KB

    • MD5

      a7c02752be70fdf740107a6b42e54536

    • SHA1

      f72ce700343a95c71613f88a3425d2967a48d5ae

    • SHA256

      8f37f9b63ada8196cf3dbad45df959d1e6771acdb9dd4e2d44e7073cb329e26d

    • SHA512

      8cd191bd31b4580b39f243a2075398da43d57ecfdad94fbcb64bf1cde5b6fbcbd326916ef1502caf710a3238a5298b76ea5345e002cd0caa8267034e7d324412

    • SSDEEP

      12288:GMrVy90wO//HiILE+BYG0vHSWKhTpC1zsI5hj0EdQEUdki4FhU8OUSR:byan/LHBYGSHbKhtCNsI5hj0qQ3n4FGx

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks