General

  • Target

    1948d73d252613238ba6edbe05d7c9d736bb78147eeb2de170231f72066211ba

  • Size

    739KB

  • Sample

    230606-vjzlrafc5z

  • MD5

    08c34d7a3b8710a6500616800143a4bb

  • SHA1

    73cc95e35ff5aa5dbecc876dd3e99126ecff3b54

  • SHA256

    1948d73d252613238ba6edbe05d7c9d736bb78147eeb2de170231f72066211ba

  • SHA512

    f21f2d6e45092070c9505658ee1a12305354628ab09ce39767fab7ebdcad0a30d47aaa8bf27ca1af438a34286d4391e6bec3eb57248a904fdfd3b7703b32b0b6

  • SSDEEP

    12288:UMrWy900swcruRTW35f2nBFTmZPCu4evxOoMVxXYBoVG8Yb6HZjlH:yytswcraTot2BFTmZ/OhIBofYmjlH

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.126:19048

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Targets

    • Target

      1948d73d252613238ba6edbe05d7c9d736bb78147eeb2de170231f72066211ba

    • Size

      739KB

    • MD5

      08c34d7a3b8710a6500616800143a4bb

    • SHA1

      73cc95e35ff5aa5dbecc876dd3e99126ecff3b54

    • SHA256

      1948d73d252613238ba6edbe05d7c9d736bb78147eeb2de170231f72066211ba

    • SHA512

      f21f2d6e45092070c9505658ee1a12305354628ab09ce39767fab7ebdcad0a30d47aaa8bf27ca1af438a34286d4391e6bec3eb57248a904fdfd3b7703b32b0b6

    • SSDEEP

      12288:UMrWy900swcruRTW35f2nBFTmZPCu4evxOoMVxXYBoVG8Yb6HZjlH:yytswcraTot2BFTmZ/OhIBofYmjlH

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks