General

  • Target

    1bf25fe75e1e72faf7191e14b1f6d2afbbcfd8c119844bd5015d90fac51648f3

  • Size

    778KB

  • Sample

    230603-jx4bbagd6z

  • MD5

    0f14f9b11c933224678665080c6438a7

  • SHA1

    ffb7ed6e8cb6d82f438ab44e4f7b88be8dd5afa5

  • SHA256

    1bf25fe75e1e72faf7191e14b1f6d2afbbcfd8c119844bd5015d90fac51648f3

  • SHA512

    44a6f2817c7274ccf96972b4e5fcbc086f4342c18220c866e2bef8598752cfd974eef4b2849fc2c5954b8749d97184667a74a6c41329b7f80653540581aac751

  • SSDEEP

    12288:TMrzy90NWwM1bXws5rDvbpN9Q8srlc2HzcPvRK03MPAOj:IylT1ss5rDzSRJzcPv13M5j

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.126:19046

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Extracted

Family

redline

Botnet

metro

C2

83.97.73.126:19046

Attributes
  • auth_value

    f7fd4aa816bdbaad933b45b51d9b6b1a

Targets

    • Target

      1bf25fe75e1e72faf7191e14b1f6d2afbbcfd8c119844bd5015d90fac51648f3

    • Size

      778KB

    • MD5

      0f14f9b11c933224678665080c6438a7

    • SHA1

      ffb7ed6e8cb6d82f438ab44e4f7b88be8dd5afa5

    • SHA256

      1bf25fe75e1e72faf7191e14b1f6d2afbbcfd8c119844bd5015d90fac51648f3

    • SHA512

      44a6f2817c7274ccf96972b4e5fcbc086f4342c18220c866e2bef8598752cfd974eef4b2849fc2c5954b8749d97184667a74a6c41329b7f80653540581aac751

    • SSDEEP

      12288:TMrzy90NWwM1bXws5rDvbpN9Q8srlc2HzcPvRK03MPAOj:IylT1ss5rDzSRJzcPv13M5j

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks