General

  • Target

    e399e3e130b139bc1a2ab5541a1ef301d762b721d17f337a6721bdfd69aac212

  • Size

    624KB

  • Sample

    230604-va915acg47

  • MD5

    ce72fc2580b8c84d39892d3feef13463

  • SHA1

    932e12cb105039c51e7678b2004c3564256474da

  • SHA256

    e399e3e130b139bc1a2ab5541a1ef301d762b721d17f337a6721bdfd69aac212

  • SHA512

    8bf6ccc40634ad9e28a5d74fe1834c214da45cb6394829fa9f6f3f13da91f8ae0c27ad545eefe5c893017714d2ba84732c62915aaeb5a61a764f245834d1acdf

  • SSDEEP

    12288:WMrwy90ukuliw0Q8jO9/kLpbSY5zd+b4gL3AnzjrK+eeG5z:2yvsw0Q8jVpJP+kg7AzjrKAU

Malware Config

Extracted

Family

redline

Botnet

dusa

C2

83.97.73.126:19046

Attributes
  • auth_value

    ee896466545fedf9de5406175fb82de5

Extracted

Family

redline

Botnet

brain

C2

83.97.73.126:19046

Attributes
  • auth_value

    5fb8269baadec0c49899b9a7a0c8851f

Targets

    • Target

      e399e3e130b139bc1a2ab5541a1ef301d762b721d17f337a6721bdfd69aac212

    • Size

      624KB

    • MD5

      ce72fc2580b8c84d39892d3feef13463

    • SHA1

      932e12cb105039c51e7678b2004c3564256474da

    • SHA256

      e399e3e130b139bc1a2ab5541a1ef301d762b721d17f337a6721bdfd69aac212

    • SHA512

      8bf6ccc40634ad9e28a5d74fe1834c214da45cb6394829fa9f6f3f13da91f8ae0c27ad545eefe5c893017714d2ba84732c62915aaeb5a61a764f245834d1acdf

    • SSDEEP

      12288:WMrwy90ukuliw0Q8jO9/kLpbSY5zd+b4gL3AnzjrK+eeG5z:2yvsw0Q8jVpJP+kg7AzjrKAU

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

2
T1112

Disabling Security Tools

1
T1089

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

2
T1005

Tasks