General

  • Target

    98ff2c4bb3f569e86dc01acd635869fef3a8e628645079b32c05e0e1998ffc2e

  • Size

    793KB

  • Sample

    230603-br1n8sfe5x

  • MD5

    f0dd1ca18a6b87ff6fee6e9d0b536079

  • SHA1

    14ee417640a14136b48041fa805ffc82d4202e31

  • SHA256

    98ff2c4bb3f569e86dc01acd635869fef3a8e628645079b32c05e0e1998ffc2e

  • SHA512

    92f493d55866d9e3ed1109ee0c1508973bb92743e7f5099454405a4f46ecbcd744e4018027f634bd570917a8bf289a1b6c89a0e32787026167f0840bd609bc74

  • SSDEEP

    12288:nMrIy90fwkE0kJDmUhmsZ+1Oonyw8GtKhdf1QJgLMbhAs2eys9D73iW6DowQ:HyMZr3/P1RkQhAs2epEW5wQ

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.126:19046

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Extracted

Family

redline

Botnet

metro

C2

83.97.73.126:19046

Attributes
  • auth_value

    f7fd4aa816bdbaad933b45b51d9b6b1a

Targets

    • Target

      98ff2c4bb3f569e86dc01acd635869fef3a8e628645079b32c05e0e1998ffc2e

    • Size

      793KB

    • MD5

      f0dd1ca18a6b87ff6fee6e9d0b536079

    • SHA1

      14ee417640a14136b48041fa805ffc82d4202e31

    • SHA256

      98ff2c4bb3f569e86dc01acd635869fef3a8e628645079b32c05e0e1998ffc2e

    • SHA512

      92f493d55866d9e3ed1109ee0c1508973bb92743e7f5099454405a4f46ecbcd744e4018027f634bd570917a8bf289a1b6c89a0e32787026167f0840bd609bc74

    • SSDEEP

      12288:nMrIy90fwkE0kJDmUhmsZ+1Oonyw8GtKhdf1QJgLMbhAs2eys9D73iW6DowQ:HyMZr3/P1RkQhAs2epEW5wQ

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks