General

  • Target

    226202b4ba98b15724602ef42dfb1e6e0e8f34379b84cd9cca0fb5c51b818d82

  • Size

    628KB

  • Sample

    230604-vss6bsch28

  • MD5

    6155d26477fc0a4edd8605f1dd81f940

  • SHA1

    2806c9c3b58d96c4d8820873ac2c35fd2b91ba13

  • SHA256

    226202b4ba98b15724602ef42dfb1e6e0e8f34379b84cd9cca0fb5c51b818d82

  • SHA512

    080d56c033e37fa96ad4823b0ecb63a4ccface46eac12d537eac543404ed6ff9efdb4c51c97435f47e6f0db4baa404cdf63f2a559f1fdd2ffb5685011bbcea08

  • SSDEEP

    12288:cMrTy90uJ2COxSOjMgxMfhADn9x6xD7HnCrOybe+52YCf:XyLjESOIgxshMn67HCrfK+5K

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.126:19046

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Targets

    • Target

      226202b4ba98b15724602ef42dfb1e6e0e8f34379b84cd9cca0fb5c51b818d82

    • Size

      628KB

    • MD5

      6155d26477fc0a4edd8605f1dd81f940

    • SHA1

      2806c9c3b58d96c4d8820873ac2c35fd2b91ba13

    • SHA256

      226202b4ba98b15724602ef42dfb1e6e0e8f34379b84cd9cca0fb5c51b818d82

    • SHA512

      080d56c033e37fa96ad4823b0ecb63a4ccface46eac12d537eac543404ed6ff9efdb4c51c97435f47e6f0db4baa404cdf63f2a559f1fdd2ffb5685011bbcea08

    • SSDEEP

      12288:cMrTy90uJ2COxSOjMgxMfhADn9x6xD7HnCrOybe+52YCf:XyLjESOIgxshMn67HCrfK+5K

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Disabling Security Tools

1
T1089

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Tasks