General

  • Target

    2bc19a1a48254b0ce6a30f471c0e870ceff05ef8ab66ce5d9bb4ecae869d3b10

  • Size

    1.3MB

  • Sample

    210827-w3nsn8vp6e

  • MD5

    58a192c56eff7d48740607232cea9d49

  • SHA1

    6bde1b43b0eabaa2151f5126c102eb3cc5dbb693

  • SHA256

    2bc19a1a48254b0ce6a30f471c0e870ceff05ef8ab66ce5d9bb4ecae869d3b10

  • SHA512

    cf97dfe3d719f05d0bbbeaf78d8e26cfe3234480e1ef98c1888b2bd316d04777c022f78d09b64f079d07a22520e7df3dc3b5eeba21346ac1f6b1eb464f78beff

Malware Config

Extracted

Family

redline

Botnet

proliv2

C2

136.243.65.8:48715

Targets

    • Target

      2bc19a1a48254b0ce6a30f471c0e870ceff05ef8ab66ce5d9bb4ecae869d3b10

    • Size

      1.3MB

    • MD5

      58a192c56eff7d48740607232cea9d49

    • SHA1

      6bde1b43b0eabaa2151f5126c102eb3cc5dbb693

    • SHA256

      2bc19a1a48254b0ce6a30f471c0e870ceff05ef8ab66ce5d9bb4ecae869d3b10

    • SHA512

      cf97dfe3d719f05d0bbbeaf78d8e26cfe3234480e1ef98c1888b2bd316d04777c022f78d09b64f079d07a22520e7df3dc3b5eeba21346ac1f6b1eb464f78beff

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Turns off Windows Defender SpyNet reporting

    • UAC bypass

    • Windows security bypass

    • Nirsoft

    • Executes dropped EXE

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Disabling Security Tools

4
T1089

Modify Registry

5
T1112

Bypass User Account Control

1
T1088

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

2
T1082

Collection

Data from Local System

1
T1005

Tasks