General

  • Target

    y7408503.exe

  • Size

    264KB

  • Sample

    230629-ebr9pscg8x

  • MD5

    e8eb46f6db3c535ba4d3cd615b36d7c0

  • SHA1

    2688a1982fe38a45868d64128be9e28c8aec39c1

  • SHA256

    3360aa5e25f5c92d71826375153c441af278f9ac3e02e4e8eb9e5b13366aa9fe

  • SHA512

    2d0bf55b2116d410b3444dea044dd6a5fff52bf818470c59672b08e1c25ce1f1b732d52a7b825516ba8afd82057c9a99818e9fb681842ad8b41bee23b59ab1bc

  • SSDEEP

    6144:Kuy+bnr+Qp0yN90QEmZyk3VkUDCG2NaVnbuVIyP2PsME/D:WMrMy90IZ/3aAcaVnCVQPsM6

Malware Config

Extracted

Family

redline

Botnet

smoke

C2

83.97.73.131:19071

Attributes
  • auth_value

    aaa47198b84c95fcce9397339e8af9d4

Targets

    • Target

      y7408503.exe

    • Size

      264KB

    • MD5

      e8eb46f6db3c535ba4d3cd615b36d7c0

    • SHA1

      2688a1982fe38a45868d64128be9e28c8aec39c1

    • SHA256

      3360aa5e25f5c92d71826375153c441af278f9ac3e02e4e8eb9e5b13366aa9fe

    • SHA512

      2d0bf55b2116d410b3444dea044dd6a5fff52bf818470c59672b08e1c25ce1f1b732d52a7b825516ba8afd82057c9a99818e9fb681842ad8b41bee23b59ab1bc

    • SSDEEP

      6144:Kuy+bnr+Qp0yN90QEmZyk3VkUDCG2NaVnbuVIyP2PsME/D:WMrMy90IZ/3aAcaVnCVQPsM6

    • Detects Healer an antivirus disabler dropper

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks