General

  • Target

    e04a885bf1009b0f846a809348fb4eea4f8d6e40fb013a2014575a285e12068c

  • Size

    793KB

  • Sample

    230603-epnhnsfd65

  • MD5

    83faf686455386002eda0545220b0da5

  • SHA1

    acb07c8bde635763ca5193a42a062817ede45bef

  • SHA256

    e04a885bf1009b0f846a809348fb4eea4f8d6e40fb013a2014575a285e12068c

  • SHA512

    5539e7f6f42676034b690577a1920f3ccfdba31c2a7ee90c981c5fb902c45d848c49c6ae0a5dfffbd350cae5ba3257e22e01855510f2f846fc60317344567ae2

  • SSDEEP

    12288:dMrQy90QTfAp5t0FoVnVaQdHHOVpwmNy2fiOSkoJQDb1pp07WzDtN4ibQ:pyh8XSAo8HYlqtQP3S7WFN7bQ

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.126:19046

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Extracted

Family

redline

Botnet

metro

C2

83.97.73.126:19046

Attributes
  • auth_value

    f7fd4aa816bdbaad933b45b51d9b6b1a

Targets

    • Target

      e04a885bf1009b0f846a809348fb4eea4f8d6e40fb013a2014575a285e12068c

    • Size

      793KB

    • MD5

      83faf686455386002eda0545220b0da5

    • SHA1

      acb07c8bde635763ca5193a42a062817ede45bef

    • SHA256

      e04a885bf1009b0f846a809348fb4eea4f8d6e40fb013a2014575a285e12068c

    • SHA512

      5539e7f6f42676034b690577a1920f3ccfdba31c2a7ee90c981c5fb902c45d848c49c6ae0a5dfffbd350cae5ba3257e22e01855510f2f846fc60317344567ae2

    • SSDEEP

      12288:dMrQy90QTfAp5t0FoVnVaQdHHOVpwmNy2fiOSkoJQDb1pp07WzDtN4ibQ:pyh8XSAo8HYlqtQP3S7WFN7bQ

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks