General

  • Target

    4873c34148bc6601bd63d4f3e7336846bd90701234293e54c9537b13a84dab3b

  • Size

    771KB

  • Sample

    230608-v94cmahc26

  • MD5

    8db6ab1c46a1cb2268fd630113553ca2

  • SHA1

    8e724a969fae1487821b7258287b5b77cc273886

  • SHA256

    4873c34148bc6601bd63d4f3e7336846bd90701234293e54c9537b13a84dab3b

  • SHA512

    8f8c155c8cb6935c3249778d885b2b4d3beee81a1e35d1763decc425059d7a0af4bd0e535ad36b0768f052938218fc8b29e23f1f5d822526c40f3c1498bc96e2

  • SSDEEP

    24576:Py7jL2N2hR5o4TmQX0y2WLzqiz0bGZtJ:aKN2rTmQX0WLz9z0GZ

Malware Config

Extracted

Family

redline

Botnet

duha

C2

83.97.73.129:19068

Attributes
  • auth_value

    aafe99874c3b8854069470882e00246c

Extracted

Family

redline

Botnet

crazy

C2

83.97.73.129:19068

Attributes
  • auth_value

    66bc4d9682ea090eef64a299ece12fdd

Targets

    • Target

      4873c34148bc6601bd63d4f3e7336846bd90701234293e54c9537b13a84dab3b

    • Size

      771KB

    • MD5

      8db6ab1c46a1cb2268fd630113553ca2

    • SHA1

      8e724a969fae1487821b7258287b5b77cc273886

    • SHA256

      4873c34148bc6601bd63d4f3e7336846bd90701234293e54c9537b13a84dab3b

    • SHA512

      8f8c155c8cb6935c3249778d885b2b4d3beee81a1e35d1763decc425059d7a0af4bd0e535ad36b0768f052938218fc8b29e23f1f5d822526c40f3c1498bc96e2

    • SSDEEP

      24576:Py7jL2N2hR5o4TmQX0y2WLzqiz0bGZtJ:aKN2rTmQX0WLz9z0GZ

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks