General

  • Target

    0331bf74d0220d0d9209e75cff9c9312630f57059c589df947a10dd1b13aa32d

  • Size

    777KB

  • Sample

    230603-2mg97sag7z

  • MD5

    a3e6b93b19200e675fddb345b81b0d53

  • SHA1

    ad0316c84b424163a2db04cd19900362d2d5c4fe

  • SHA256

    0331bf74d0220d0d9209e75cff9c9312630f57059c589df947a10dd1b13aa32d

  • SHA512

    4e05a8a7c5f4555cef26bc4043c6c47b80993d5f341536aed3adcb1c5f17fa2d21db5a3a414b99052b643a3a76b0a49b70cd36e1295c553263e4397c7fa68e38

  • SSDEEP

    12288:KMr2y90AdisVL68NjcKSivik5qf1vK24pvi9NkRf6fAbsGoCaaRhNV:4y5ZNjcKSBkstvJ4lOchb6CaahNV

Malware Config

Extracted

Family

redline

Botnet

dusa

C2

83.97.73.126:19046

Attributes
  • auth_value

    ee896466545fedf9de5406175fb82de5

Extracted

Family

redline

Botnet

brain

C2

83.97.73.126:19046

Attributes
  • auth_value

    5fb8269baadec0c49899b9a7a0c8851f

Targets

    • Target

      0331bf74d0220d0d9209e75cff9c9312630f57059c589df947a10dd1b13aa32d

    • Size

      777KB

    • MD5

      a3e6b93b19200e675fddb345b81b0d53

    • SHA1

      ad0316c84b424163a2db04cd19900362d2d5c4fe

    • SHA256

      0331bf74d0220d0d9209e75cff9c9312630f57059c589df947a10dd1b13aa32d

    • SHA512

      4e05a8a7c5f4555cef26bc4043c6c47b80993d5f341536aed3adcb1c5f17fa2d21db5a3a414b99052b643a3a76b0a49b70cd36e1295c553263e4397c7fa68e38

    • SSDEEP

      12288:KMr2y90AdisVL68NjcKSivik5qf1vK24pvi9NkRf6fAbsGoCaaRhNV:4y5ZNjcKSBkstvJ4lOchb6CaahNV

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks