General

  • Target

    9b989dbddd426a31f75add654de9deb31d038477d79595ee991246bade89d891

  • Size

    778KB

  • Sample

    230603-lgezwsgf9v

  • MD5

    fa72b5f340200bd080c18ca1a22e6316

  • SHA1

    61341bb7e41dc0ba63f87fd3e67f2daaaf0111d2

  • SHA256

    9b989dbddd426a31f75add654de9deb31d038477d79595ee991246bade89d891

  • SHA512

    61010fa65bd4cae7bca1f07df28cef8529c6cb455e7c9ac8b360c1694c977a1a07451a51aeff5e67744a31be7a600039a25c6cce052a4a483fa7449566666593

  • SSDEEP

    12288:gMr9y90w80F60FHA1UfBxp7FKI5FmuROtDS0vDIHUfCLRlR10l5PW+Ox60L:Nyg0U0FHA1QzkIjmHjvDTaFlgl5A

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.126:19046

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Extracted

Family

redline

Botnet

metro

C2

83.97.73.126:19046

Attributes
  • auth_value

    f7fd4aa816bdbaad933b45b51d9b6b1a

Targets

    • Target

      9b989dbddd426a31f75add654de9deb31d038477d79595ee991246bade89d891

    • Size

      778KB

    • MD5

      fa72b5f340200bd080c18ca1a22e6316

    • SHA1

      61341bb7e41dc0ba63f87fd3e67f2daaaf0111d2

    • SHA256

      9b989dbddd426a31f75add654de9deb31d038477d79595ee991246bade89d891

    • SHA512

      61010fa65bd4cae7bca1f07df28cef8529c6cb455e7c9ac8b360c1694c977a1a07451a51aeff5e67744a31be7a600039a25c6cce052a4a483fa7449566666593

    • SSDEEP

      12288:gMr9y90w80F60FHA1UfBxp7FKI5FmuROtDS0vDIHUfCLRlR10l5PW+Ox60L:Nyg0U0FHA1QzkIjmHjvDTaFlgl5A

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks