General

  • Target

    d825fa29205747a0583ba9342989eb71043ceebdb323a3c717ec7149763799f3

  • Size

    753KB

  • Sample

    230602-amka1shd9t

  • MD5

    9dee4b6818c91c7345ec4115d10d78cd

  • SHA1

    c2efa40cbdd0faacab8d39d83841e626f8190df1

  • SHA256

    d825fa29205747a0583ba9342989eb71043ceebdb323a3c717ec7149763799f3

  • SHA512

    f4cde1c872fdc3218364dbbdc7dc95180a29bf43e21c92e9f93face87e90853cdc4381904cbd41ae65af02586e5b1669f52d4348e5b4c8bbb63c975d6af5f149

  • SSDEEP

    12288:EMr1y90mDBy7MuaF/UoL8hR4S/On9XtE2soN2MBEgBJnsdrvskrhw5ygEL:JyTVy5aBxARr/y9dE2fNdBtQ9w5ypL

Malware Config

Extracted

Family

redline

Botnet

mars

C2

83.97.73.127:19045

Attributes
  • auth_value

    91bd3682cfb50cdc64b6009eb977b766

Extracted

Family

redline

Botnet

grom

C2

83.97.73.127:19045

Attributes
  • auth_value

    2193aac8692a5e1ec66d9db9fa25ee00

Targets

    • Target

      d825fa29205747a0583ba9342989eb71043ceebdb323a3c717ec7149763799f3

    • Size

      753KB

    • MD5

      9dee4b6818c91c7345ec4115d10d78cd

    • SHA1

      c2efa40cbdd0faacab8d39d83841e626f8190df1

    • SHA256

      d825fa29205747a0583ba9342989eb71043ceebdb323a3c717ec7149763799f3

    • SHA512

      f4cde1c872fdc3218364dbbdc7dc95180a29bf43e21c92e9f93face87e90853cdc4381904cbd41ae65af02586e5b1669f52d4348e5b4c8bbb63c975d6af5f149

    • SSDEEP

      12288:EMr1y90mDBy7MuaF/UoL8hR4S/On9XtE2soN2MBEgBJnsdrvskrhw5ygEL:JyTVy5aBxARr/y9dE2fNdBtQ9w5ypL

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks