General

  • Target

    63d579b67b0b1fd7534a4028c002d1ec2bb7bb9b7ec5a7cbdbeafef43b24e930

  • Size

    794KB

  • Sample

    230603-htc5aagc4v

  • MD5

    fc38859f5f2d193016c9be5b0a4f50ca

  • SHA1

    b127934ec2cca8e8eeacda5beccf2a92f392469b

  • SHA256

    63d579b67b0b1fd7534a4028c002d1ec2bb7bb9b7ec5a7cbdbeafef43b24e930

  • SHA512

    f0aa9c5cff482d4258988791fc0f2e232605e1ba0e188a497ea19b17d8797dd625efe0cfbc57b4be631fa2240e6c1c180eb95746789f8ed368cc89369e671341

  • SSDEEP

    12288:bMrmy90dDcv9batXj7+W7c5lvj0A2BDIy0YjBPvgw4j2DLRfTQtBWGEvWzD/PJC:dyBxa1j7p7a2Vv02JQ2HxTjvWHBC

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.126:19046

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Extracted

Family

redline

Botnet

metro

C2

83.97.73.126:19046

Attributes
  • auth_value

    f7fd4aa816bdbaad933b45b51d9b6b1a

Targets

    • Target

      63d579b67b0b1fd7534a4028c002d1ec2bb7bb9b7ec5a7cbdbeafef43b24e930

    • Size

      794KB

    • MD5

      fc38859f5f2d193016c9be5b0a4f50ca

    • SHA1

      b127934ec2cca8e8eeacda5beccf2a92f392469b

    • SHA256

      63d579b67b0b1fd7534a4028c002d1ec2bb7bb9b7ec5a7cbdbeafef43b24e930

    • SHA512

      f0aa9c5cff482d4258988791fc0f2e232605e1ba0e188a497ea19b17d8797dd625efe0cfbc57b4be631fa2240e6c1c180eb95746789f8ed368cc89369e671341

    • SSDEEP

      12288:bMrmy90dDcv9batXj7+W7c5lvj0A2BDIy0YjBPvgw4j2DLRfTQtBWGEvWzD/PJC:dyBxa1j7p7a2Vv02JQ2HxTjvWHBC

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks