General

  • Target

    fd5de86167d231576006f71d7d0d7ca271dd98c67bd2105b24e8d976a6b168f2

  • Size

    753KB

  • Sample

    230602-d3lqkaaa9y

  • MD5

    801e8f62d2a792d4252380c997e90e83

  • SHA1

    90a329f273960392c920223422331496c68737f0

  • SHA256

    fd5de86167d231576006f71d7d0d7ca271dd98c67bd2105b24e8d976a6b168f2

  • SHA512

    704700aec753d0e8e3579df75ed2910260d21d7b1e5860f74609c87c106f0948e04f3aa981b8b8f5dd892b0dcc3bf9d74e13671cebaf7bb96abe8d3fbf3a3c93

  • SSDEEP

    12288:YMrAy90Bjx7hgA5iWsSW+q6nM3kpJN/ldA1U5zRSwfsa12xDsZ5JTd9xl2e:YyCdgU+t3kRDaUvoDK94e

Malware Config

Extracted

Family

redline

Botnet

mars

C2

83.97.73.127:19045

Attributes
  • auth_value

    91bd3682cfb50cdc64b6009eb977b766

Extracted

Family

redline

Botnet

grom

C2

83.97.73.127:19045

Attributes
  • auth_value

    2193aac8692a5e1ec66d9db9fa25ee00

Targets

    • Target

      fd5de86167d231576006f71d7d0d7ca271dd98c67bd2105b24e8d976a6b168f2

    • Size

      753KB

    • MD5

      801e8f62d2a792d4252380c997e90e83

    • SHA1

      90a329f273960392c920223422331496c68737f0

    • SHA256

      fd5de86167d231576006f71d7d0d7ca271dd98c67bd2105b24e8d976a6b168f2

    • SHA512

      704700aec753d0e8e3579df75ed2910260d21d7b1e5860f74609c87c106f0948e04f3aa981b8b8f5dd892b0dcc3bf9d74e13671cebaf7bb96abe8d3fbf3a3c93

    • SSDEEP

      12288:YMrAy90Bjx7hgA5iWsSW+q6nM3kpJN/ldA1U5zRSwfsa12xDsZ5JTd9xl2e:YyCdgU+t3kRDaUvoDK94e

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks