General

  • Target

    088cab25b5dacbda739345cdcbd7aec0cbc9ae051b355ca3836bc2f05e9eae75

  • Size

    793KB

  • Sample

    230603-bcqwgsfa74

  • MD5

    2d3cd3a645d9f7b8762092ec72d5046e

  • SHA1

    87e884b25e93f00b6ff3f609a673f0d21b7f2a8e

  • SHA256

    088cab25b5dacbda739345cdcbd7aec0cbc9ae051b355ca3836bc2f05e9eae75

  • SHA512

    404462211627fbc9fd40a9588d41cbb158e2ff7285cfb260dbc84473514ff7dc30a225a3c227c4c0c5b413611e9d27d736a1e10ae8bb2e5ebabbb5a3bded55ac

  • SSDEEP

    12288:sMr4y90Xy6gUvXqkt4tVYU3w2g7ZxLJ5uUCJ0iEs0f4/wWEDG+V:cy7svqkkVTw2g7LCJ0iz0TWSV

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.126:19046

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Extracted

Family

redline

Botnet

metro

C2

83.97.73.126:19046

Attributes
  • auth_value

    f7fd4aa816bdbaad933b45b51d9b6b1a

Targets

    • Target

      088cab25b5dacbda739345cdcbd7aec0cbc9ae051b355ca3836bc2f05e9eae75

    • Size

      793KB

    • MD5

      2d3cd3a645d9f7b8762092ec72d5046e

    • SHA1

      87e884b25e93f00b6ff3f609a673f0d21b7f2a8e

    • SHA256

      088cab25b5dacbda739345cdcbd7aec0cbc9ae051b355ca3836bc2f05e9eae75

    • SHA512

      404462211627fbc9fd40a9588d41cbb158e2ff7285cfb260dbc84473514ff7dc30a225a3c227c4c0c5b413611e9d27d736a1e10ae8bb2e5ebabbb5a3bded55ac

    • SSDEEP

      12288:sMr4y90Xy6gUvXqkt4tVYU3w2g7ZxLJ5uUCJ0iEs0f4/wWEDG+V:cy7svqkkVTw2g7LCJ0iz0TWSV

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks