General

  • Target

    06095999.exe

  • Size

    779KB

  • Sample

    230603-yda8rahh26

  • MD5

    ccde25b9c0e72b2dc6e3bb5b4534b952

  • SHA1

    437605d03d119596231ff414526a0e0829131278

  • SHA256

    28c3fbf1b878013cdf6a8d4da5f9149491e28f5a9e1752e17c278c0d36bd2539

  • SHA512

    eae0fe130dde68e0d7287eeb4916b5e4d637ef951cb830e6dcd3d4576d6302e054b5a1a0256e1ae456064e253ec3d3b9fadb628665b67ac1091615a0848c914b

  • SSDEEP

    12288:+Mrvy90A2bZS7xidYhup0peHgpmcsmG7rkMFxMl3iWQ+NNiscFUF8hR0:ByQSFiape10ixMl3iWhNI1UFP

Malware Config

Extracted

Family

redline

Botnet

dusa

C2

83.97.73.126:19046

Attributes
  • auth_value

    ee896466545fedf9de5406175fb82de5

Extracted

Family

redline

Botnet

brain

C2

83.97.73.126:19046

Attributes
  • auth_value

    5fb8269baadec0c49899b9a7a0c8851f

Targets

    • Target

      06095999.exe

    • Size

      779KB

    • MD5

      ccde25b9c0e72b2dc6e3bb5b4534b952

    • SHA1

      437605d03d119596231ff414526a0e0829131278

    • SHA256

      28c3fbf1b878013cdf6a8d4da5f9149491e28f5a9e1752e17c278c0d36bd2539

    • SHA512

      eae0fe130dde68e0d7287eeb4916b5e4d637ef951cb830e6dcd3d4576d6302e054b5a1a0256e1ae456064e253ec3d3b9fadb628665b67ac1091615a0848c914b

    • SSDEEP

      12288:+Mrvy90A2bZS7xidYhup0peHgpmcsmG7rkMFxMl3iWQ+NNiscFUF8hR0:ByQSFiape10ixMl3iWhNI1UFP

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks