General

  • Target

    84cd39ab4dd4e51eec940f94690e31e6a1f424f258aad4fbde9f1ca78b836cba

  • Size

    734KB

  • Sample

    230605-z5crbsah39

  • MD5

    c3680db566dc0f1c05f9ec47619889da

  • SHA1

    38c5ccb2ee8f7cdac4a24e9d34b1f4cef2ef8529

  • SHA256

    84cd39ab4dd4e51eec940f94690e31e6a1f424f258aad4fbde9f1ca78b836cba

  • SHA512

    27393b23b5a65dade0ac51b70b5644e810ad51b9ab7d309d64e0c20c57c36e2d38a97b4a428e7d7978c27cb6081a828c833558254c5d38c592aa8886ad1646bb

  • SSDEEP

    12288:2Mruy90kCF4yb8OybxcN8I8UQfyCjZbDvM0brZFWcNPW2XpeHrU49OkS:syC41bKWI8/6ebdXtW2XQg

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.126:19048

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Targets

    • Target

      84cd39ab4dd4e51eec940f94690e31e6a1f424f258aad4fbde9f1ca78b836cba

    • Size

      734KB

    • MD5

      c3680db566dc0f1c05f9ec47619889da

    • SHA1

      38c5ccb2ee8f7cdac4a24e9d34b1f4cef2ef8529

    • SHA256

      84cd39ab4dd4e51eec940f94690e31e6a1f424f258aad4fbde9f1ca78b836cba

    • SHA512

      27393b23b5a65dade0ac51b70b5644e810ad51b9ab7d309d64e0c20c57c36e2d38a97b4a428e7d7978c27cb6081a828c833558254c5d38c592aa8886ad1646bb

    • SSDEEP

      12288:2Mruy90kCF4yb8OybxcN8I8UQfyCjZbDvM0brZFWcNPW2XpeHrU49OkS:syC41bKWI8/6ebdXtW2XQg

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks