General

  • Target

    08eb822f0cd140dc6a6a0fcd35b695c540f3dc6a334d2054d6a7c02c30146d8d

  • Size

    778KB

  • Sample

    230603-z4j41saa99

  • MD5

    0f88b1170b6c6d8de0bc1776edd411ef

  • SHA1

    033c636fb8f2ff99cfae69209340907780d2fb4d

  • SHA256

    08eb822f0cd140dc6a6a0fcd35b695c540f3dc6a334d2054d6a7c02c30146d8d

  • SHA512

    cc7f1230f3e08731285c1e3f1adf4ee0da03f5dc2f37f8e70d77cd0b3a4dde43ca3e164a7d8af7d456cdfb1ae137d4a4c7f050b6f68ccb58d2d355bf3362ff6c

  • SSDEEP

    12288:FMr2y90osGUIJFl0/Kdy9vJjpV6zE9+4R4Fclk5xbBg+Qfhve9DCAlAzBa+E:Dy1DFa/iZzE9+4R3+5Qd5SvlOaB

Malware Config

Extracted

Family

redline

Botnet

dusa

C2

83.97.73.126:19046

Attributes
  • auth_value

    ee896466545fedf9de5406175fb82de5

Extracted

Family

redline

Botnet

brain

C2

83.97.73.126:19046

Attributes
  • auth_value

    5fb8269baadec0c49899b9a7a0c8851f

Targets

    • Target

      08eb822f0cd140dc6a6a0fcd35b695c540f3dc6a334d2054d6a7c02c30146d8d

    • Size

      778KB

    • MD5

      0f88b1170b6c6d8de0bc1776edd411ef

    • SHA1

      033c636fb8f2ff99cfae69209340907780d2fb4d

    • SHA256

      08eb822f0cd140dc6a6a0fcd35b695c540f3dc6a334d2054d6a7c02c30146d8d

    • SHA512

      cc7f1230f3e08731285c1e3f1adf4ee0da03f5dc2f37f8e70d77cd0b3a4dde43ca3e164a7d8af7d456cdfb1ae137d4a4c7f050b6f68ccb58d2d355bf3362ff6c

    • SSDEEP

      12288:FMr2y90osGUIJFl0/Kdy9vJjpV6zE9+4R4Fclk5xbBg+Qfhve9DCAlAzBa+E:Dy1DFa/iZzE9+4R3+5Qd5SvlOaB

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks