General

  • Target

    7f0292999ee4cc33b277e233da9e12b474819ee9c4c70b8794b02001b497201f

  • Size

    729KB

  • Sample

    230605-3dxh7sbf9z

  • MD5

    46815041586eeb70f31c33e7a30557b9

  • SHA1

    7b36ef79b7569ee69baa7e0d3d0c0b54a332bc61

  • SHA256

    7f0292999ee4cc33b277e233da9e12b474819ee9c4c70b8794b02001b497201f

  • SHA512

    b7a8076723d69bc050a76e3320da93888ca3ab96286c212d7b57a4a9164a47d288ba8ac12ffadab0b2a36459f3a25ecfcaf66f98aeec55372f0f823cea4735da

  • SSDEEP

    12288:iMrMy900G/Erjtj35n+W0JR7LYltIBOQvgDoLuGzh9k3HRg:KyA/Erjn+WA7LItIYpDoOq

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.126:19048

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Targets

    • Target

      7f0292999ee4cc33b277e233da9e12b474819ee9c4c70b8794b02001b497201f

    • Size

      729KB

    • MD5

      46815041586eeb70f31c33e7a30557b9

    • SHA1

      7b36ef79b7569ee69baa7e0d3d0c0b54a332bc61

    • SHA256

      7f0292999ee4cc33b277e233da9e12b474819ee9c4c70b8794b02001b497201f

    • SHA512

      b7a8076723d69bc050a76e3320da93888ca3ab96286c212d7b57a4a9164a47d288ba8ac12ffadab0b2a36459f3a25ecfcaf66f98aeec55372f0f823cea4735da

    • SSDEEP

      12288:iMrMy900G/Erjtj35n+W0JR7LYltIBOQvgDoLuGzh9k3HRg:KyA/Erjn+WA7LItIYpDoOq

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks