General

  • Target

    c11a0ddabf9f0aa376a98ff9ec6cce82df0ed14b650adbdd1afb9685eb441623

  • Size

    777KB

  • Sample

    230603-2sxl3sag9t

  • MD5

    8a4d3f96791dd63895de44b6898a5578

  • SHA1

    5a4c40289af1a07aae494ced519c9495ac6387ff

  • SHA256

    c11a0ddabf9f0aa376a98ff9ec6cce82df0ed14b650adbdd1afb9685eb441623

  • SHA512

    fd841da6ead0a9d48fc0a8a4900119fa5dbca559ec534b3f1997f6db853eb1e751e9a3b0bcba2b6c7d505b3ef3a45eeea3147b5b1eba477ab7040f8f9b83e469

  • SSDEEP

    24576:My0JKa4NIxDd8TeVO+Hs7N8zmunXnXhJb5:76bC5+M78XxJ

Malware Config

Extracted

Family

redline

Botnet

dusa

C2

83.97.73.126:19046

Attributes
  • auth_value

    ee896466545fedf9de5406175fb82de5

Extracted

Family

redline

Botnet

brain

C2

83.97.73.126:19046

Attributes
  • auth_value

    5fb8269baadec0c49899b9a7a0c8851f

Targets

    • Target

      c11a0ddabf9f0aa376a98ff9ec6cce82df0ed14b650adbdd1afb9685eb441623

    • Size

      777KB

    • MD5

      8a4d3f96791dd63895de44b6898a5578

    • SHA1

      5a4c40289af1a07aae494ced519c9495ac6387ff

    • SHA256

      c11a0ddabf9f0aa376a98ff9ec6cce82df0ed14b650adbdd1afb9685eb441623

    • SHA512

      fd841da6ead0a9d48fc0a8a4900119fa5dbca559ec534b3f1997f6db853eb1e751e9a3b0bcba2b6c7d505b3ef3a45eeea3147b5b1eba477ab7040f8f9b83e469

    • SSDEEP

      24576:My0JKa4NIxDd8TeVO+Hs7N8zmunXnXhJb5:76bC5+M78XxJ

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks