General

  • Target

    86e7cfe8e0fa765e8bb92f2bfc2034bb31c3338c432a14a3dba7a066ab83e3f5

  • Size

    780KB

  • Sample

    230603-kj8vbage6t

  • MD5

    0a397dbd37bc1cc5297b6c3e2db5ebb2

  • SHA1

    5e56d06fa0b2ba2f783946b78934aed2191e219d

  • SHA256

    86e7cfe8e0fa765e8bb92f2bfc2034bb31c3338c432a14a3dba7a066ab83e3f5

  • SHA512

    e93cafddde647e76945222010f3292a20b341c7c69918d1fa40053a2ceaaf5f6227b65b11f99e0b00b81335d3ef9ac25007a967ea8fb0d2c73611416ee0c1193

  • SSDEEP

    12288:3Mrpy90t/jwvOoGNyW9N8lURHch1O5mYpG0dXvlL6LHcn402MPmu9osxL:ayjOoGyWn8SsO5mYBxuHcnaMOsp

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.126:19046

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Extracted

Family

redline

Botnet

metro

C2

83.97.73.126:19046

Attributes
  • auth_value

    f7fd4aa816bdbaad933b45b51d9b6b1a

Targets

    • Target

      86e7cfe8e0fa765e8bb92f2bfc2034bb31c3338c432a14a3dba7a066ab83e3f5

    • Size

      780KB

    • MD5

      0a397dbd37bc1cc5297b6c3e2db5ebb2

    • SHA1

      5e56d06fa0b2ba2f783946b78934aed2191e219d

    • SHA256

      86e7cfe8e0fa765e8bb92f2bfc2034bb31c3338c432a14a3dba7a066ab83e3f5

    • SHA512

      e93cafddde647e76945222010f3292a20b341c7c69918d1fa40053a2ceaaf5f6227b65b11f99e0b00b81335d3ef9ac25007a967ea8fb0d2c73611416ee0c1193

    • SSDEEP

      12288:3Mrpy90t/jwvOoGNyW9N8lURHch1O5mYpG0dXvlL6LHcn402MPmu9osxL:ayjOoGyWn8SsO5mYBxuHcnaMOsp

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks