General

  • Target

    f3a3adfe057cbbacd9bb818db2f9dbc8f5f9f874d342e9b2cffb9bf34d752f86

  • Size

    753KB

  • Sample

    230602-gxk4maab76

  • MD5

    70c0ccc8d351e7ed3ba118a3e8978be7

  • SHA1

    2eb6b46e77a6cb8257c7a9f908377203ae4aea2d

  • SHA256

    f3a3adfe057cbbacd9bb818db2f9dbc8f5f9f874d342e9b2cffb9bf34d752f86

  • SHA512

    0318b83ec44be3fb7b336d58547488a1c399cc2375aca32c4dfd0652e59e711900665c4df76d2d4fc8dafe8e51903fa380a645dbdfcddb03019f1a8e5c8403b2

  • SSDEEP

    12288:NMrVy90y4Dqd2FNRDz0RRBXbc9VFzuazI3Ek9+D0fDHC7bPznXmNZJ/7:Uy/4s2Pd0RRBLcYa0l9+8KPznAZJT

Malware Config

Extracted

Family

redline

Botnet

dars

C2

83.97.73.127:19045

Attributes
  • auth_value

    7cd208e6b6c927262304d5d4d88647fd

Extracted

Family

redline

Botnet

grom

C2

83.97.73.127:19045

Attributes
  • auth_value

    2193aac8692a5e1ec66d9db9fa25ee00

Targets

    • Target

      f3a3adfe057cbbacd9bb818db2f9dbc8f5f9f874d342e9b2cffb9bf34d752f86

    • Size

      753KB

    • MD5

      70c0ccc8d351e7ed3ba118a3e8978be7

    • SHA1

      2eb6b46e77a6cb8257c7a9f908377203ae4aea2d

    • SHA256

      f3a3adfe057cbbacd9bb818db2f9dbc8f5f9f874d342e9b2cffb9bf34d752f86

    • SHA512

      0318b83ec44be3fb7b336d58547488a1c399cc2375aca32c4dfd0652e59e711900665c4df76d2d4fc8dafe8e51903fa380a645dbdfcddb03019f1a8e5c8403b2

    • SSDEEP

      12288:NMrVy90y4Dqd2FNRDz0RRBXbc9VFzuazI3Ek9+D0fDHC7bPznXmNZJ/7:Uy/4s2Pd0RRBLcYa0l9+8KPznAZJT

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks