General

  • Target

    fe78b4b8c859b03bee590cfce5f880a1b6c73d3ea8b7a665e33ff0d1857be9a3

  • Size

    736KB

  • Sample

    230605-2q9hvsba92

  • MD5

    dacf7df0c7c9d08f2682108f2ae1f1e9

  • SHA1

    386971b2ac7a2fd08f409762bb283b57b69acd1f

  • SHA256

    fe78b4b8c859b03bee590cfce5f880a1b6c73d3ea8b7a665e33ff0d1857be9a3

  • SHA512

    734e2bd55c96caab115520f19b1055b81b241b9a611b97f27fad05d6a3dea26cf462974bb3418673c48d0f300c415ea760aa551a009dc1fe0278b155165213aa

  • SSDEEP

    12288:zMriy90urYMku7FY4TcJKKmQz4DCvfwTdPSaF2kdpd1pqtqmyXi7M0:9yHYei4oJ5mNDeYB2G7tih

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.126:19048

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Targets

    • Target

      fe78b4b8c859b03bee590cfce5f880a1b6c73d3ea8b7a665e33ff0d1857be9a3

    • Size

      736KB

    • MD5

      dacf7df0c7c9d08f2682108f2ae1f1e9

    • SHA1

      386971b2ac7a2fd08f409762bb283b57b69acd1f

    • SHA256

      fe78b4b8c859b03bee590cfce5f880a1b6c73d3ea8b7a665e33ff0d1857be9a3

    • SHA512

      734e2bd55c96caab115520f19b1055b81b241b9a611b97f27fad05d6a3dea26cf462974bb3418673c48d0f300c415ea760aa551a009dc1fe0278b155165213aa

    • SSDEEP

      12288:zMriy90urYMku7FY4TcJKKmQz4DCvfwTdPSaF2kdpd1pqtqmyXi7M0:9yHYei4oJ5mNDeYB2G7tih

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks