General

  • Target

    02382399.bin

  • Size

    742KB

  • Sample

    230605-nqlvxagg71

  • MD5

    76f71df3e3991d8855a36254f7563f28

  • SHA1

    3d6b061e26ed874ce922ed8cafc31618c55f13b4

  • SHA256

    480d0f7a979f44d716295e4a87f76723a68bd27d7b880b77d2199817c5aa09c1

  • SHA512

    1d25246b685ac1852974bae0a7e965a7f0ea354cf7966708bc01e10c612ccfdf1b9ff6da27bbe7f1af2501ffef8850366eb967cd776ffaebd3fca8b12e98aa74

  • SSDEEP

    12288:vHUPMyoz2e4svRnm95qBpODpLjj0KgZ+CHWBK15jLJSrxzw/tYpNK7wLXBA1N6VX:vPNz2OvRmiODpLf0KWR2BoBLeFwINK0R

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.126:19046

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Extracted

Family

redline

Botnet

metro

C2

83.97.73.126:19046

Attributes
  • auth_value

    f7fd4aa816bdbaad933b45b51d9b6b1a

Targets

    • Target

      203554d11cd8d9a8fcad90f71604ed56e55fc587e0f10528e3a711117106e097.exe

    • Size

      785KB

    • MD5

      35699ee3be7623f358c8025e1be611b1

    • SHA1

      99e8cacaf28ff00088e3db272a4cdae88377d27b

    • SHA256

      203554d11cd8d9a8fcad90f71604ed56e55fc587e0f10528e3a711117106e097

    • SHA512

      09fb9defbd5c84841e009655568a84dcc6a47e438c268946f01eda7226ef56aa1694e4635f1ce89f35d59429c6411d8bc6919886bf28f31c78766669e51ce300

    • SSDEEP

      12288:rMrpy90QXmu+J5dRE9kUo6V8/x/owmJ6IbQhjPOFKcITVGRv0LWDDAPmuR51:myLYwSvNKwy1QhLOYxGmLW4P5F

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

2
T1112

Disabling Security Tools

1
T1089

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks