General

  • Target

    fa3c9ce5b7ef20e8d3fd8d6e7c075ef16b6dfd2d41a8a26f20f820c817711faf

  • Size

    793KB

  • Sample

    230603-jdehvaga22

  • MD5

    0fbbc41d615d8a1813c6c72c5e037847

  • SHA1

    0b7cbc1a95e46ff4f517eb2b96620e314821b4f2

  • SHA256

    fa3c9ce5b7ef20e8d3fd8d6e7c075ef16b6dfd2d41a8a26f20f820c817711faf

  • SHA512

    5268f6e0675064f8b16e0ce32781db9abd911d6a123ce2ba180c3264e0bcbdf7aa6a5ac4031ad5ef9a78fdee12215b3ca3b66e719bf38034b371f1027d7232a3

  • SSDEEP

    12288:WMrBy90FE10Yc/LJ1kvFxExdVActmjSMYjHXacTdDWzDtakb:nyOTJWmmctmjSMiachDWVRb

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.126:19046

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Extracted

Family

redline

Botnet

metro

C2

83.97.73.126:19046

Attributes
  • auth_value

    f7fd4aa816bdbaad933b45b51d9b6b1a

Targets

    • Target

      fa3c9ce5b7ef20e8d3fd8d6e7c075ef16b6dfd2d41a8a26f20f820c817711faf

    • Size

      793KB

    • MD5

      0fbbc41d615d8a1813c6c72c5e037847

    • SHA1

      0b7cbc1a95e46ff4f517eb2b96620e314821b4f2

    • SHA256

      fa3c9ce5b7ef20e8d3fd8d6e7c075ef16b6dfd2d41a8a26f20f820c817711faf

    • SHA512

      5268f6e0675064f8b16e0ce32781db9abd911d6a123ce2ba180c3264e0bcbdf7aa6a5ac4031ad5ef9a78fdee12215b3ca3b66e719bf38034b371f1027d7232a3

    • SSDEEP

      12288:WMrBy90FE10Yc/LJ1kvFxExdVActmjSMYjHXacTdDWzDtakb:nyOTJWmmctmjSMiachDWVRb

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks