General

  • Target

    34600e512dc1a644eef8a26b709c08fc72798da9e9817d6dd504c165ab00dd5d

  • Size

    778KB

  • Sample

    230603-yqfc8sad7x

  • MD5

    8dc27a31a9cc1fec969cf16cb16fbe55

  • SHA1

    a6b18a1142cb5f828c1e9b9788b0965be28d74ee

  • SHA256

    34600e512dc1a644eef8a26b709c08fc72798da9e9817d6dd504c165ab00dd5d

  • SHA512

    ca627f8814b99402339f145d4fe796a6deac4e8fa44f01cc010d0ef4757cdaaf6d1d88bcfdf8b9c0685109ac908b5148f4e75062c40f70d132c94f10a9feecd9

  • SSDEEP

    12288:FMrly90pR1nKIl/lqijBzHiUppRNpvevGGFOgNAItbEJxNMvdDRAq6Dh87:MySRFNqijtHiWp7Y+wNhtoOl2qom

Malware Config

Extracted

Family

redline

Botnet

dusa

C2

83.97.73.126:19046

Attributes
  • auth_value

    ee896466545fedf9de5406175fb82de5

Extracted

Family

redline

Botnet

brain

C2

83.97.73.126:19046

Attributes
  • auth_value

    5fb8269baadec0c49899b9a7a0c8851f

Targets

    • Target

      34600e512dc1a644eef8a26b709c08fc72798da9e9817d6dd504c165ab00dd5d

    • Size

      778KB

    • MD5

      8dc27a31a9cc1fec969cf16cb16fbe55

    • SHA1

      a6b18a1142cb5f828c1e9b9788b0965be28d74ee

    • SHA256

      34600e512dc1a644eef8a26b709c08fc72798da9e9817d6dd504c165ab00dd5d

    • SHA512

      ca627f8814b99402339f145d4fe796a6deac4e8fa44f01cc010d0ef4757cdaaf6d1d88bcfdf8b9c0685109ac908b5148f4e75062c40f70d132c94f10a9feecd9

    • SSDEEP

      12288:FMrly90pR1nKIl/lqijBzHiUppRNpvevGGFOgNAItbEJxNMvdDRAq6Dh87:MySRFNqijtHiWp7Y+wNhtoOl2qom

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.