General

  • Target

    2b4c0e5846698d9123d9e2372255f7ad26b4f7dcad10af96c8eceb2e20a3a1c1

  • Size

    739KB

  • Sample

    230606-qsqb8adh36

  • MD5

    0a534cb2cd92e1aec6a499ce81a96f69

  • SHA1

    141b40bfb143e50635cbf27fb00c1497342ff864

  • SHA256

    2b4c0e5846698d9123d9e2372255f7ad26b4f7dcad10af96c8eceb2e20a3a1c1

  • SHA512

    d8b9a6fcd2d590517250b720d1905f482a4ed8534f39c2d07c540c9d9c3c1bba333ce7b710004aa404a06b2517f0fb8d335a35295fe91e90283ff4ef04a985cc

  • SSDEEP

    12288:yMrqy9075/bfpVL+6R4sgSMCWHHjfNrzNWB000eVgwdzMQk2wIwswLa:0ykVxFhMCiHjf5z8+01OeMdmwO

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.126:19048

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Targets

    • Target

      2b4c0e5846698d9123d9e2372255f7ad26b4f7dcad10af96c8eceb2e20a3a1c1

    • Size

      739KB

    • MD5

      0a534cb2cd92e1aec6a499ce81a96f69

    • SHA1

      141b40bfb143e50635cbf27fb00c1497342ff864

    • SHA256

      2b4c0e5846698d9123d9e2372255f7ad26b4f7dcad10af96c8eceb2e20a3a1c1

    • SHA512

      d8b9a6fcd2d590517250b720d1905f482a4ed8534f39c2d07c540c9d9c3c1bba333ce7b710004aa404a06b2517f0fb8d335a35295fe91e90283ff4ef04a985cc

    • SSDEEP

      12288:yMrqy9075/bfpVL+6R4sgSMCWHHjfNrzNWB000eVgwdzMQk2wIwswLa:0ykVxFhMCiHjf5z8+01OeMdmwO

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Tasks