General

  • Target

    05373399.exe

  • Size

    795KB

  • Sample

    230603-khhazage5s

  • MD5

    2cee87ba5364050d8920c1b937dd3457

  • SHA1

    580179f3c05819fc745c4bca83847d9c0a053efe

  • SHA256

    1fe656aa86c153c81b47b6329acca320af07f635d52712b8adc84e88a3d3623b

  • SHA512

    5e1ab1a5c69c55739c834a772a3bfc1764309f3d880c945478fedef840658de5184e6d98fea8dbc131568abeeb391acc410dc3a6c1be68b95103047b15604730

  • SSDEEP

    12288:rMrMy905HHwvtMGusLIxA+saxa/ln+2mfBajHyErWCDhLZ6N2v2:ry6HHQtzQqzagI2mfwyqWUG2+

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.126:19046

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Extracted

Family

redline

Botnet

metro

C2

83.97.73.126:19046

Attributes
  • auth_value

    f7fd4aa816bdbaad933b45b51d9b6b1a

Targets

    • Target

      05373399.exe

    • Size

      795KB

    • MD5

      2cee87ba5364050d8920c1b937dd3457

    • SHA1

      580179f3c05819fc745c4bca83847d9c0a053efe

    • SHA256

      1fe656aa86c153c81b47b6329acca320af07f635d52712b8adc84e88a3d3623b

    • SHA512

      5e1ab1a5c69c55739c834a772a3bfc1764309f3d880c945478fedef840658de5184e6d98fea8dbc131568abeeb391acc410dc3a6c1be68b95103047b15604730

    • SSDEEP

      12288:rMrMy905HHwvtMGusLIxA+saxa/ln+2mfBajHyErWCDhLZ6N2v2:ry6HHQtzQqzagI2mfwyqWUG2+

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks