General

  • Target

    0aef3aef127a4f780fc0166e4ed8ebac.exe

  • Size

    549KB

  • Sample

    211220-vreasacbdj

  • MD5

    0aef3aef127a4f780fc0166e4ed8ebac

  • SHA1

    de5e59cd81f17027d811400bc7d48765e1d55df2

  • SHA256

    e7aa0daa42cf46f9268775f5deff2b2f9574ef893202491521e89a7540688152

  • SHA512

    1cd35a889aebf12b42b43eb83aa8c224e1896045c37b0f08f89b5910ff55e15bcba9e215f97ead7432dc47796263508906287e184ab9f6c602097f7eb93ce5fa

Malware Config

Extracted

Family

redline

Botnet

10

C2

18.191.251.199:45097

Targets

    • Target

      0aef3aef127a4f780fc0166e4ed8ebac.exe

    • Size

      549KB

    • MD5

      0aef3aef127a4f780fc0166e4ed8ebac

    • SHA1

      de5e59cd81f17027d811400bc7d48765e1d55df2

    • SHA256

      e7aa0daa42cf46f9268775f5deff2b2f9574ef893202491521e89a7540688152

    • SHA512

      1cd35a889aebf12b42b43eb83aa8c224e1896045c37b0f08f89b5910ff55e15bcba9e215f97ead7432dc47796263508906287e184ab9f6c602097f7eb93ce5fa

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine Payload

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Defense Evasion

Modify Registry

2
T1112

Disabling Security Tools

1
T1089

Install Root Certificate

1
T1130

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks