General

  • Target

    ee9871d7de78ab88febed13644ff9d45.exe

  • Size

    738KB

  • Sample

    230606-lw4xkadf3z

  • MD5

    ee9871d7de78ab88febed13644ff9d45

  • SHA1

    d237436f82b8212d086ea831f1a93c5213b2a621

  • SHA256

    ef32fdb91bb66e640ae6a50917f1f8154b39e998ead71423324cdd3e52cb99e2

  • SHA512

    c4e470340eeb4622c6a7565e8e7dfd95c74493f82997e9f2a5a3792f9279a38f55057793cf9c69d66373a83040483036a5907fbf032eacc19fc343de84c7eaf5

  • SSDEEP

    12288:hMryy90wiJqEs2QCJETgQPTpJUreokh2HsoOzh63LbEr9tM3uY2x8/OHrxv7SxZo:7yZihs2EEYpquIOzh67bEJt6uRK/aU4

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.126:19048

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Targets

    • Target

      ee9871d7de78ab88febed13644ff9d45.exe

    • Size

      738KB

    • MD5

      ee9871d7de78ab88febed13644ff9d45

    • SHA1

      d237436f82b8212d086ea831f1a93c5213b2a621

    • SHA256

      ef32fdb91bb66e640ae6a50917f1f8154b39e998ead71423324cdd3e52cb99e2

    • SHA512

      c4e470340eeb4622c6a7565e8e7dfd95c74493f82997e9f2a5a3792f9279a38f55057793cf9c69d66373a83040483036a5907fbf032eacc19fc343de84c7eaf5

    • SSDEEP

      12288:hMryy90wiJqEs2QCJETgQPTpJUreokh2HsoOzh63LbEr9tM3uY2x8/OHrxv7SxZo:7yZihs2EEYpquIOzh67bEJt6uRK/aU4

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks