General

  • Target

    e8c68d272d7334b9ffabcd43b31ab534f70d384f143a257e6ce7e8a545aac675

  • Size

    785KB

  • Sample

    230602-zaqppsed25

  • MD5

    60416edaae2543a257bfb179d7ed271b

  • SHA1

    1c484b773411f0f7aaced8c9dfca025f83d7475b

  • SHA256

    e8c68d272d7334b9ffabcd43b31ab534f70d384f143a257e6ce7e8a545aac675

  • SHA512

    e5d7bcd5bc154763220779a7b91945f19f51ade68bcb4e42a6dba84d8cd43c92c1a4b181c741a244addec4d086fd8f801ef22b8f18abc6e991918fdcb423a051

  • SSDEEP

    12288:LMrZy90fMt7J8DnnLHUqaEWHIb/8ptPPvN+ZKGRP0FWDDOl0gD:GywMd+Dnr5aER8316KGWFWPgD

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.126:19046

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Extracted

Family

redline

Botnet

metro

C2

83.97.73.126:19046

Attributes
  • auth_value

    f7fd4aa816bdbaad933b45b51d9b6b1a

Targets

    • Target

      e8c68d272d7334b9ffabcd43b31ab534f70d384f143a257e6ce7e8a545aac675

    • Size

      785KB

    • MD5

      60416edaae2543a257bfb179d7ed271b

    • SHA1

      1c484b773411f0f7aaced8c9dfca025f83d7475b

    • SHA256

      e8c68d272d7334b9ffabcd43b31ab534f70d384f143a257e6ce7e8a545aac675

    • SHA512

      e5d7bcd5bc154763220779a7b91945f19f51ade68bcb4e42a6dba84d8cd43c92c1a4b181c741a244addec4d086fd8f801ef22b8f18abc6e991918fdcb423a051

    • SSDEEP

      12288:LMrZy90fMt7J8DnnLHUqaEWHIb/8ptPPvN+ZKGRP0FWDDOl0gD:GywMd+Dnr5aER8316KGWFWPgD

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks