General

  • Target

    6876fb3d6bd73b84aade769a5c11e90f.bin

  • Size

    742KB

  • Sample

    230605-net25sgb59

  • MD5

    a9003859b99dd6ea01120a7b3548c3ac

  • SHA1

    157b6a970e4f939d17e4ab1a52cfa541a680a3ad

  • SHA256

    09d4d8c953cc09780d65ed6fa3c854200667a6a6d1fb9e5efeca4449168496a3

  • SHA512

    da0053eadf2b9d141323e9829ba56e973a4227acf97d77bae1a231b7190fe0f52683a231322ebecee0d54525f8f6e74b11af4f61e3770385e1ffd637998ecac2

  • SSDEEP

    12288:NZ6KUnc0oZOUoBT0oBEHHfDKOErSjVGqfylz4xdDeGaG7uZnLLd83EARWgCPxCyg:F0oZOUo90oBEH/+QVGq6LGlukcO

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.126:19046

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Extracted

Family

redline

Botnet

metro

C2

83.97.73.126:19046

Attributes
  • auth_value

    f7fd4aa816bdbaad933b45b51d9b6b1a

Targets

    • Target

      8d59e1888065057e604fb16758f2bf608b65cdf4164d925d7921117717602ca9.exe

    • Size

      785KB

    • MD5

      6876fb3d6bd73b84aade769a5c11e90f

    • SHA1

      a261ade928434437fb7ecb1ab6c93a6a603d81f9

    • SHA256

      8d59e1888065057e604fb16758f2bf608b65cdf4164d925d7921117717602ca9

    • SHA512

      37c7434b20849144c6557e1784a1d7b2f26c0094ab9fea9e201b6571a3d0ff64b26e1ac21c85e4cdb893b648e912406741ce7f52736adf47329d99d3ffaf83ef

    • SSDEEP

      12288:rMrwy90Dt4bdv4SseotN4alAig/onQhkRVilWkvdAestKR3GRv0DWDD7ihC29B:fym4bdBsxtNNrnQh+ViHdAPsGmDW8NB

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks