General

  • Target

    152e377e630a9f676dde3ef11d41884af99726af69af12e0385348ad972b3970

  • Size

    776KB

  • Sample

    230607-ceh44aha4z

  • MD5

    f87f992f761726b984b7005c313bf852

  • SHA1

    351ad717b39574c4e702aa1e21dc3dbf488cc5e0

  • SHA256

    152e377e630a9f676dde3ef11d41884af99726af69af12e0385348ad972b3970

  • SHA512

    efbf41b8b374422d7b52c38ac3a916407da6e987a6a6b7c292cc992695cc90e852c33bf07ee6f5a36722f145cd1a44ceca23035e66789af08bbe56db9e3fe208

  • SSDEEP

    12288:EMrDy90A+3pyTjHgLzGd/JlZiSSCJ4tzWI8zMJeRqT042ckXQtxuE9tmRS1sCZkP:fy1gfk/JlDnI8zMIY0tXQtxuE9t+AW

Malware Config

Extracted

Family

redline

Botnet

masa

C2

83.97.73.126:19048

Attributes
  • auth_value

    9f945269efb5978b14b0bdd13ea1f115

Targets

    • Target

      152e377e630a9f676dde3ef11d41884af99726af69af12e0385348ad972b3970

    • Size

      776KB

    • MD5

      f87f992f761726b984b7005c313bf852

    • SHA1

      351ad717b39574c4e702aa1e21dc3dbf488cc5e0

    • SHA256

      152e377e630a9f676dde3ef11d41884af99726af69af12e0385348ad972b3970

    • SHA512

      efbf41b8b374422d7b52c38ac3a916407da6e987a6a6b7c292cc992695cc90e852c33bf07ee6f5a36722f145cd1a44ceca23035e66789af08bbe56db9e3fe208

    • SSDEEP

      12288:EMrDy90A+3pyTjHgLzGd/JlZiSSCJ4tzWI8zMJeRqT042ckXQtxuE9tmRS1sCZkP:fy1gfk/JlDnI8zMIY0tXQtxuE9t+AW

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks