General

  • Target

    00352734607744f5295007ed5279356486282d49b155b7a8a0c11351995014dd

  • Size

    778KB

  • Sample

    230604-dgtjaabd6v

  • MD5

    bba178c67709d63495561524de08b159

  • SHA1

    b21e7cd25541bd3cfc30e305025474c1722592f2

  • SHA256

    00352734607744f5295007ed5279356486282d49b155b7a8a0c11351995014dd

  • SHA512

    779956bc692b88f5773ebc1bf48ef8681b4239d91fdc444938358759081c2c579795c20b510fd8eb5a643941842403bb8225004346f3236db300146f1ca25c9b

  • SSDEEP

    12288:MMr6y90OAIrdEk8wzWvuOgQh08LbStRoZGJpHH4SMbl6VDSAF6ZYz4:WyRrzWuOR08PsRokHHS4VnF34

Malware Config

Extracted

Family

redline

Botnet

dusa

C2

83.97.73.126:19046

Attributes
  • auth_value

    ee896466545fedf9de5406175fb82de5

Extracted

Family

redline

Botnet

brain

C2

83.97.73.126:19046

Attributes
  • auth_value

    5fb8269baadec0c49899b9a7a0c8851f

Targets

    • Target

      00352734607744f5295007ed5279356486282d49b155b7a8a0c11351995014dd

    • Size

      778KB

    • MD5

      bba178c67709d63495561524de08b159

    • SHA1

      b21e7cd25541bd3cfc30e305025474c1722592f2

    • SHA256

      00352734607744f5295007ed5279356486282d49b155b7a8a0c11351995014dd

    • SHA512

      779956bc692b88f5773ebc1bf48ef8681b4239d91fdc444938358759081c2c579795c20b510fd8eb5a643941842403bb8225004346f3236db300146f1ca25c9b

    • SSDEEP

      12288:MMr6y90OAIrdEk8wzWvuOgQh08LbStRoZGJpHH4SMbl6VDSAF6ZYz4:WyRrzWuOR08PsRokHHS4VnF34

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks