General

  • Target

    4c7be7c12b50de157de3283abad697693b4422601c03aa20040089f0711e5b27

  • Size

    755KB

  • Sample

    230601-wf6fkaff45

  • MD5

    87c3accdfb81941ccad5ebcdf74de780

  • SHA1

    1c9a8a0f0132a7e17c40879dd4e218da79da3e03

  • SHA256

    4c7be7c12b50de157de3283abad697693b4422601c03aa20040089f0711e5b27

  • SHA512

    d60b7ca3b8daf5a173c61831897694f0685b8adda5b2c7762a4f3be6990b92658aaaa38f1014e84608e5beaa6f77551a0f3b8808f2761951982649e5301586b6

  • SSDEEP

    12288:tMrPy90HVF14ZK5gSElIo8uTuY19JGENLP7GXvdtsTlBpZVSFH61X:uyAVb4ZK5rEl/zNLPyXvcTlBpmFHi

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.127:19045

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Extracted

Family

redline

Botnet

rocker

C2

83.97.73.127:19045

Attributes
  • auth_value

    b4693c25843b5a1c7d63376e73e32dae

Targets

    • Target

      4c7be7c12b50de157de3283abad697693b4422601c03aa20040089f0711e5b27

    • Size

      755KB

    • MD5

      87c3accdfb81941ccad5ebcdf74de780

    • SHA1

      1c9a8a0f0132a7e17c40879dd4e218da79da3e03

    • SHA256

      4c7be7c12b50de157de3283abad697693b4422601c03aa20040089f0711e5b27

    • SHA512

      d60b7ca3b8daf5a173c61831897694f0685b8adda5b2c7762a4f3be6990b92658aaaa38f1014e84608e5beaa6f77551a0f3b8808f2761951982649e5301586b6

    • SSDEEP

      12288:tMrPy90HVF14ZK5gSElIo8uTuY19JGENLP7GXvdtsTlBpZVSFH61X:uyAVb4ZK5rEl/zNLPyXvcTlBpmFHi

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks