General

  • Target

    d6b66a0ef20a3ea2313ca754bcde7f45efd6f0973a5fbbe43f4b78fd33030c98

  • Size

    766KB

  • Sample

    230211-1wjzqabg85

  • MD5

    9620935a01767336e1f97960462bd168

  • SHA1

    97d9930b7bd78a474603085efccad4ce48610d08

  • SHA256

    d6b66a0ef20a3ea2313ca754bcde7f45efd6f0973a5fbbe43f4b78fd33030c98

  • SHA512

    46a261985443faa3c95c16899b88e7c5970f2e35bf757bdc3e64e095bd8afe3834b6757cb4038d987548a0d7b08d44b797653e13eb5188fe2174c469c86b50dc

  • SSDEEP

    12288:XMr8y90RHMeBgUaAMlP5cZEN66fbADnYSmK0qutFM8IlQqby1HssSeOvQG2:nygM4gAMPMTYK0qutY67Fspews

Malware Config

Extracted

Family

redline

Botnet

romik

C2

193.233.20.12:4132

Attributes
  • auth_value

    8fb78d2889ba0ca42678b59b884e88ff

Extracted

Family

redline

Botnet

dunm

C2

193.233.20.12:4132

Attributes
  • auth_value

    352959e3707029296ec94306d74e2334

Extracted

Family

redline

Botnet

crypt1

C2

176.113.115.17:4132

Attributes
  • auth_value

    2e2ca7bbceaa9f98252a6f9fc0e6fa86

Targets

    • Target

      d6b66a0ef20a3ea2313ca754bcde7f45efd6f0973a5fbbe43f4b78fd33030c98

    • Size

      766KB

    • MD5

      9620935a01767336e1f97960462bd168

    • SHA1

      97d9930b7bd78a474603085efccad4ce48610d08

    • SHA256

      d6b66a0ef20a3ea2313ca754bcde7f45efd6f0973a5fbbe43f4b78fd33030c98

    • SHA512

      46a261985443faa3c95c16899b88e7c5970f2e35bf757bdc3e64e095bd8afe3834b6757cb4038d987548a0d7b08d44b797653e13eb5188fe2174c469c86b50dc

    • SSDEEP

      12288:XMr8y90RHMeBgUaAMlP5cZEN66fbADnYSmK0qutFM8IlQqby1HssSeOvQG2:nygM4gAMPMTYK0qutY67Fspews

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks