General

  • Target

    3b1ebd3fec44cdaec8f799444e2ca35090b7ac4f66f4a27fc0c44f661d724cec

  • Size

    793KB

  • Sample

    230603-ccswhsff21

  • MD5

    76fc3ec09376b29d30d01a42981a593e

  • SHA1

    52b762c3b2466e0f1d87a31a230ec82c6358973b

  • SHA256

    3b1ebd3fec44cdaec8f799444e2ca35090b7ac4f66f4a27fc0c44f661d724cec

  • SHA512

    7e7dbf88a0c499186b3acf000007df55cac14320ae6c04b331cf406bb29a2a8dd0f301a03a1d68ab15d186640b59cd28aaa43601f174d275ec27aef98a2a6013

  • SSDEEP

    24576:OyA4Zhn0iJASP/FhreBOpANt9TMczWs9EA:dAqv1hrs6zs9E

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.126:19046

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Extracted

Family

redline

Botnet

metro

C2

83.97.73.126:19046

Attributes
  • auth_value

    f7fd4aa816bdbaad933b45b51d9b6b1a

Targets

    • Target

      3b1ebd3fec44cdaec8f799444e2ca35090b7ac4f66f4a27fc0c44f661d724cec

    • Size

      793KB

    • MD5

      76fc3ec09376b29d30d01a42981a593e

    • SHA1

      52b762c3b2466e0f1d87a31a230ec82c6358973b

    • SHA256

      3b1ebd3fec44cdaec8f799444e2ca35090b7ac4f66f4a27fc0c44f661d724cec

    • SHA512

      7e7dbf88a0c499186b3acf000007df55cac14320ae6c04b331cf406bb29a2a8dd0f301a03a1d68ab15d186640b59cd28aaa43601f174d275ec27aef98a2a6013

    • SSDEEP

      24576:OyA4Zhn0iJASP/FhreBOpANt9TMczWs9EA:dAqv1hrs6zs9E

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks