General

  • Target

    01752699.exe

  • Size

    731KB

  • Sample

    230531-pxpqtafc71

  • MD5

    54b8c0192777a9ac854d10e435646de5

  • SHA1

    1405a013cd4f585e99aded515662a60ee8b0ddcb

  • SHA256

    14a73056456af609274b99bed6e3f2a481240bf943d6b25d11f552cdf97b0b9a

  • SHA512

    6e7c199f238d34c385bb6e1123b444b1769eace98a3eac0d409ceed5ab2ae8ac87f479eb02beb45ba52ac5c28ba55f47e17116cdb624120250b0921271a90475

  • SSDEEP

    12288:rMr7y90EXk2oU/eVlLdlclnEvlFDyGIN+F6H8cszCYqmy28QvkNNXUD8sA:4yLXk2oUWvUlEvruGIN+FJU2Lc3UQT

Malware Config

Extracted

Family

redline

Botnet

dars

C2

83.97.73.127:19045

Attributes
  • auth_value

    7cd208e6b6c927262304d5d4d88647fd

Extracted

Family

redline

Botnet

nitro

C2

83.97.73.127:19045

Attributes
  • auth_value

    1b68cf84b9b046f28b71cb39e44aa0e4

Targets

    • Target

      01752699.exe

    • Size

      731KB

    • MD5

      54b8c0192777a9ac854d10e435646de5

    • SHA1

      1405a013cd4f585e99aded515662a60ee8b0ddcb

    • SHA256

      14a73056456af609274b99bed6e3f2a481240bf943d6b25d11f552cdf97b0b9a

    • SHA512

      6e7c199f238d34c385bb6e1123b444b1769eace98a3eac0d409ceed5ab2ae8ac87f479eb02beb45ba52ac5c28ba55f47e17116cdb624120250b0921271a90475

    • SSDEEP

      12288:rMr7y90EXk2oU/eVlLdlclnEvlFDyGIN+F6H8cszCYqmy28QvkNNXUD8sA:4yLXk2oUWvUlEvruGIN+FJU2Lc3UQT

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks