General

  • Target

    cd331355e7193809073b3c5aabad039d0eda4363500295cb925e1350dc7cc7c3

  • Size

    778KB

  • Sample

    230603-whjdtahe24

  • MD5

    bfc9408af6416ce4f5d35c1b6a3c00a6

  • SHA1

    c7530e4584db26fa4a14bf1e62546f57c18f1ae0

  • SHA256

    cd331355e7193809073b3c5aabad039d0eda4363500295cb925e1350dc7cc7c3

  • SHA512

    df5f8f18f163e53d679908b1eff4133c42a906af7aa4a732594386ebe09d82a5a1722193f66fa5d77b597f035ebe1454aeb84ef121a07188abf7370e5f9ea975

  • SSDEEP

    12288:DMrny905TC7wS0KRCY9Kgio+Lkge34KfIRP3mtzQSED3AAkmKD9Nx:UyMCdBxiosreLfo3mtzAUAYJj

Malware Config

Extracted

Family

redline

Botnet

musa

C2

83.97.73.126:19046

Attributes
  • auth_value

    745cd242a52ab79c9c9026155d62f359

Extracted

Family

redline

Botnet

brain

C2

83.97.73.126:19046

Attributes
  • auth_value

    5fb8269baadec0c49899b9a7a0c8851f

Targets

    • Target

      cd331355e7193809073b3c5aabad039d0eda4363500295cb925e1350dc7cc7c3

    • Size

      778KB

    • MD5

      bfc9408af6416ce4f5d35c1b6a3c00a6

    • SHA1

      c7530e4584db26fa4a14bf1e62546f57c18f1ae0

    • SHA256

      cd331355e7193809073b3c5aabad039d0eda4363500295cb925e1350dc7cc7c3

    • SHA512

      df5f8f18f163e53d679908b1eff4133c42a906af7aa4a732594386ebe09d82a5a1722193f66fa5d77b597f035ebe1454aeb84ef121a07188abf7370e5f9ea975

    • SSDEEP

      12288:DMrny905TC7wS0KRCY9Kgio+Lkge34KfIRP3mtzQSED3AAkmKD9Nx:UyMCdBxiosreLfo3mtzAUAYJj

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks