General

  • Target

    6a1b06db64db921ffde1e1658e29bf6499fab9ae83be89e287469a383850d3aa

  • Size

    738KB

  • Sample

    230606-qxa34aed7v

  • MD5

    a6e092032d6863b2526c26a205477a84

  • SHA1

    b1d8b8cfcc1edda4a3a8dc4ceac46e16297351b4

  • SHA256

    6a1b06db64db921ffde1e1658e29bf6499fab9ae83be89e287469a383850d3aa

  • SHA512

    a1311c4fa4844ef3cbe9d557b8c9326e39deea1fa087fab203ff894d1d25cc161600be9d7e9d99900e78af3d268cae8ba7eaadca0115050d934dc04bab435eaf

  • SSDEEP

    12288:nMrjy90xzPTmiEJ+5JK0ClOBaKia+hZ2om0qmM0kQU1y8CahJsDzM7j4NiHnNdX:cy4zPTmh053ClxatOnmD3sE7j4Nif

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.126:19048

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Targets

    • Target

      6a1b06db64db921ffde1e1658e29bf6499fab9ae83be89e287469a383850d3aa

    • Size

      738KB

    • MD5

      a6e092032d6863b2526c26a205477a84

    • SHA1

      b1d8b8cfcc1edda4a3a8dc4ceac46e16297351b4

    • SHA256

      6a1b06db64db921ffde1e1658e29bf6499fab9ae83be89e287469a383850d3aa

    • SHA512

      a1311c4fa4844ef3cbe9d557b8c9326e39deea1fa087fab203ff894d1d25cc161600be9d7e9d99900e78af3d268cae8ba7eaadca0115050d934dc04bab435eaf

    • SSDEEP

      12288:nMrjy90xzPTmiEJ+5JK0ClOBaKia+hZ2om0qmM0kQU1y8CahJsDzM7j4NiHnNdX:cy4zPTmh053ClxatOnmD3sE7j4Nif

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Tasks