General

  • Target

    01748399.exe

  • Size

    793KB

  • Sample

    230603-kf1pjage3y

  • MD5

    452007575d034037ffd429e50dd961d9

  • SHA1

    cf14a71bb6e921304fdc542b130c33e347b1e049

  • SHA256

    52c857e19a4532d89366ff58d73179898b036161fd359cc5ea76cc665473f158

  • SHA512

    8ef373df201d76ac3d37fe357324d108334df578a82c029440c5bb0f60777009f0d09d0a1a175bfb66c472f4abc4436a54c008add25aa0135e77b62f4e706894

  • SSDEEP

    12288:BMruy90ziPUTmeY83+pYjiCYmiIS1pjApgnUKMwRLbqW6DCVTpNU3:byT4mi0vCYHLRAp4UjwlqW7VTDU3

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.126:19046

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Extracted

Family

redline

Botnet

metro

C2

83.97.73.126:19046

Attributes
  • auth_value

    f7fd4aa816bdbaad933b45b51d9b6b1a

Targets

    • Target

      01748399.exe

    • Size

      793KB

    • MD5

      452007575d034037ffd429e50dd961d9

    • SHA1

      cf14a71bb6e921304fdc542b130c33e347b1e049

    • SHA256

      52c857e19a4532d89366ff58d73179898b036161fd359cc5ea76cc665473f158

    • SHA512

      8ef373df201d76ac3d37fe357324d108334df578a82c029440c5bb0f60777009f0d09d0a1a175bfb66c472f4abc4436a54c008add25aa0135e77b62f4e706894

    • SSDEEP

      12288:BMruy90ziPUTmeY83+pYjiCYmiIS1pjApgnUKMwRLbqW6DCVTpNU3:byT4mi0vCYHLRAp4UjwlqW7VTDU3

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks