General

  • Target

    f0e91b5625708f63a08390c23ace26004725476b5c679198241f6282a5e43e60

  • Size

    738KB

  • Sample

    230606-r96afaeb62

  • MD5

    f634793c58e32402a29c27eed52abe14

  • SHA1

    81eb03cf0815ce31017e1bd37ac0f859f520f14c

  • SHA256

    f0e91b5625708f63a08390c23ace26004725476b5c679198241f6282a5e43e60

  • SHA512

    8e739445af721fdda21f362d49cdf6a2bf61560b6af85bfbbd64b72c06d4a51cbf0ff44eface619c0aca6d8b785d6ef473dd4a3cacbbfb461d8c9565d91fc30f

  • SSDEEP

    12288:VMrHy90we9cWZFNaYGEP4+6KPbJtA0xE1UnIM42l1pYTcDxxUPKjhr6SK1r1:WyY3ZqYG7stAvUnIM4lYIPKjl6H1Z

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.126:19048

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      f0e91b5625708f63a08390c23ace26004725476b5c679198241f6282a5e43e60

    • Size

      738KB

    • MD5

      f634793c58e32402a29c27eed52abe14

    • SHA1

      81eb03cf0815ce31017e1bd37ac0f859f520f14c

    • SHA256

      f0e91b5625708f63a08390c23ace26004725476b5c679198241f6282a5e43e60

    • SHA512

      8e739445af721fdda21f362d49cdf6a2bf61560b6af85bfbbd64b72c06d4a51cbf0ff44eface619c0aca6d8b785d6ef473dd4a3cacbbfb461d8c9565d91fc30f

    • SSDEEP

      12288:VMrHy90we9cWZFNaYGEP4+6KPbJtA0xE1UnIM42l1pYTcDxxUPKjhr6SK1r1:WyY3ZqYG7stAvUnIM4lYIPKjl6H1Z

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks