General

  • Target

    01a1abacffc18e6f0798d57f2e024811daa24d5137eb27e84ac7ae90222e2318

  • Size

    771KB

  • Sample

    230608-s6dlpage74

  • MD5

    6164ad0bb84df816d4b7e5476a4e8258

  • SHA1

    b604062ee830e422e2f92715ff2d93a1e8fc9b5d

  • SHA256

    01a1abacffc18e6f0798d57f2e024811daa24d5137eb27e84ac7ae90222e2318

  • SHA512

    682e299e37400a868bdca12299dc8db194f733353f2bc03a3558499177713350b76566e79a1bf3f6f97c541a5507c1edff26c6459b260cebe0ddf5450765bcc2

  • SSDEEP

    12288:UMrHy90x9JGKJRGArxJNY8no3m/+yK8MyfciIrtK9vzLj/8/Hm265W3:ryA7xKArQ3dyZZc9rtIb8/mHW3

Malware Config

Extracted

Family

redline

Botnet

muha

C2

83.97.73.129:19068

Attributes
  • auth_value

    3c237e5fecb41481b7af249e79828a46

Extracted

Family

redline

Botnet

crazy

C2

83.97.73.129:19068

Attributes
  • auth_value

    66bc4d9682ea090eef64a299ece12fdd

Targets

    • Target

      01a1abacffc18e6f0798d57f2e024811daa24d5137eb27e84ac7ae90222e2318

    • Size

      771KB

    • MD5

      6164ad0bb84df816d4b7e5476a4e8258

    • SHA1

      b604062ee830e422e2f92715ff2d93a1e8fc9b5d

    • SHA256

      01a1abacffc18e6f0798d57f2e024811daa24d5137eb27e84ac7ae90222e2318

    • SHA512

      682e299e37400a868bdca12299dc8db194f733353f2bc03a3558499177713350b76566e79a1bf3f6f97c541a5507c1edff26c6459b260cebe0ddf5450765bcc2

    • SSDEEP

      12288:UMrHy90x9JGKJRGArxJNY8no3m/+yK8MyfciIrtK9vzLj/8/Hm265W3:ryA7xKArQ3dyZZc9rtIb8/mHW3

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks