General

  • Target

    bc942682246b364f4ed72fc86852e28f39fec3ff33d7df92a5d4971098efb8b7

  • Size

    754KB

  • Sample

    230602-ebyrgsab4v

  • MD5

    743cedad3af8256da477a07d25379f46

  • SHA1

    bae0cb2377129a29aac44be9f0bad763e469ff28

  • SHA256

    bc942682246b364f4ed72fc86852e28f39fec3ff33d7df92a5d4971098efb8b7

  • SHA512

    b8afc63ca3514bdbae054cd3ec37bcf71a52448f6e92a79391a0e8bc70839713f6136e019cccee3ec8657e6d160ab6ee4b3dd36be28e1e3d71781763eb582e92

  • SSDEEP

    12288:7Mrly90RlbWAK78Uo5ZwcXx6np4lIbuDsOLDczTn+wsRFBDRN8Z8z5pbRKzNpB:6yqbWJ4BvtMKlJ92TsRFBD/LDbRAB

Malware Config

Extracted

Family

redline

Botnet

dars

C2

83.97.73.127:19045

Attributes
  • auth_value

    7cd208e6b6c927262304d5d4d88647fd

Extracted

Family

redline

Botnet

grom

C2

83.97.73.127:19045

Attributes
  • auth_value

    2193aac8692a5e1ec66d9db9fa25ee00

Targets

    • Target

      bc942682246b364f4ed72fc86852e28f39fec3ff33d7df92a5d4971098efb8b7

    • Size

      754KB

    • MD5

      743cedad3af8256da477a07d25379f46

    • SHA1

      bae0cb2377129a29aac44be9f0bad763e469ff28

    • SHA256

      bc942682246b364f4ed72fc86852e28f39fec3ff33d7df92a5d4971098efb8b7

    • SHA512

      b8afc63ca3514bdbae054cd3ec37bcf71a52448f6e92a79391a0e8bc70839713f6136e019cccee3ec8657e6d160ab6ee4b3dd36be28e1e3d71781763eb582e92

    • SSDEEP

      12288:7Mrly90RlbWAK78Uo5ZwcXx6np4lIbuDsOLDczTn+wsRFBDRN8Z8z5pbRKzNpB:6yqbWJ4BvtMKlJ92TsRFBD/LDbRAB

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks