General

  • Target

    3f1163d234c9c78476dd320a6b61ee4f.exe

  • Size

    751KB

  • Sample

    230601-e234wsda3s

  • MD5

    3f1163d234c9c78476dd320a6b61ee4f

  • SHA1

    794ea7bbc7dcd1ac4981496dadd3fd6824dc54a3

  • SHA256

    1a74d537af761a00dabc74fd911d5f3984a229e4829ddcee27d4fe81b0a2a837

  • SHA512

    eba6cd26baf5c2ffca955f9d4bb1c06765d8a10b472a766a9bfdd6041b5edb6b3e4eec6d311354ac584a67640a36d2a2bdb48b0a634b0ae786c8f4a0929d1322

  • SSDEEP

    12288:fMr2y90/sE20+KkGOxgg5yY7VAplPoYwjvpr717KczWSe8Wyg8jGKWs1wfub8AF3:tybP0xkjxgg5VyLoPdr71K3N8q8jL90w

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.127:19045

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Extracted

Family

redline

Botnet

rocker

C2

83.97.73.127:19045

Attributes
  • auth_value

    b4693c25843b5a1c7d63376e73e32dae

Targets

    • Target

      3f1163d234c9c78476dd320a6b61ee4f.exe

    • Size

      751KB

    • MD5

      3f1163d234c9c78476dd320a6b61ee4f

    • SHA1

      794ea7bbc7dcd1ac4981496dadd3fd6824dc54a3

    • SHA256

      1a74d537af761a00dabc74fd911d5f3984a229e4829ddcee27d4fe81b0a2a837

    • SHA512

      eba6cd26baf5c2ffca955f9d4bb1c06765d8a10b472a766a9bfdd6041b5edb6b3e4eec6d311354ac584a67640a36d2a2bdb48b0a634b0ae786c8f4a0929d1322

    • SSDEEP

      12288:fMr2y90/sE20+KkGOxgg5yY7VAplPoYwjvpr717KczWSe8Wyg8jGKWs1wfub8AF3:tybP0xkjxgg5VyLoPdr71K3N8q8jL90w

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks