General

  • Target

    a9ad29b00dfda07553cfa52cb4df1b07.exe

  • Size

    792KB

  • Sample

    230602-19mmrsef43

  • MD5

    a9ad29b00dfda07553cfa52cb4df1b07

  • SHA1

    52e48c3a9d77bb63b020563a7794d11248a3d3cf

  • SHA256

    435258b05e020aff3ecdd7d57d7e4e2698725b71e18c378a6e2cb5681950e710

  • SHA512

    70e5cca5b3cf7b3ffef39046a57b5550840fa0a05cc5ea59abf219f8b7878a83e0a4a885c531a580a3acc1ade01c5e937709839152b169e94f97cce3c35056da

  • SSDEEP

    12288:dMrVy90Bo00vfAHadDw1iRlheZfhQlh6wEfKQ3g5G5i1RWzDMNOp:Yypv46ds12lYZfhOY3t8RW7p

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.126:19046

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Extracted

Family

redline

Botnet

metro

C2

83.97.73.126:19046

Attributes
  • auth_value

    f7fd4aa816bdbaad933b45b51d9b6b1a

Targets

    • Target

      a9ad29b00dfda07553cfa52cb4df1b07.exe

    • Size

      792KB

    • MD5

      a9ad29b00dfda07553cfa52cb4df1b07

    • SHA1

      52e48c3a9d77bb63b020563a7794d11248a3d3cf

    • SHA256

      435258b05e020aff3ecdd7d57d7e4e2698725b71e18c378a6e2cb5681950e710

    • SHA512

      70e5cca5b3cf7b3ffef39046a57b5550840fa0a05cc5ea59abf219f8b7878a83e0a4a885c531a580a3acc1ade01c5e937709839152b169e94f97cce3c35056da

    • SSDEEP

      12288:dMrVy90Bo00vfAHadDw1iRlheZfhQlh6wEfKQ3g5G5i1RWzDMNOp:Yypv46ds12lYZfhOY3t8RW7p

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks