General

  • Target

    c23d9f39c0dbb02d5d6f3c437199efb94727713fd3e21e437a4540c27590574b

  • Size

    766KB

  • Sample

    230212-fjsqwafb9y

  • MD5

    15f580bb1bba0a2ba8e7912a71c10b7f

  • SHA1

    a9b9abaaf8b91b694b23a1e3ad1e18f9342274ab

  • SHA256

    c23d9f39c0dbb02d5d6f3c437199efb94727713fd3e21e437a4540c27590574b

  • SHA512

    05b0f0b1181128f4ca6d391f2be3140e9431185e8c81ef22314247ba6645e87dd6ed3a9706b5ddaae743faf1b665e313b87c4cc72981152039f202bdb50363d4

  • SSDEEP

    12288:CMray90LPkj0VGnWtYXInXytlf/S7NIThoy/n6Zv88HbhBqxYf3:YyG8wVhbniL/Syp/nivpu6f

Malware Config

Extracted

Family

redline

Botnet

crypt1

C2

176.113.115.17:4132

Attributes
  • auth_value

    2e2ca7bbceaa9f98252a6f9fc0e6fa86

Extracted

Family

redline

Botnet

dunm

C2

193.233.20.12:4132

Attributes
  • auth_value

    352959e3707029296ec94306d74e2334

Targets

    • Target

      c23d9f39c0dbb02d5d6f3c437199efb94727713fd3e21e437a4540c27590574b

    • Size

      766KB

    • MD5

      15f580bb1bba0a2ba8e7912a71c10b7f

    • SHA1

      a9b9abaaf8b91b694b23a1e3ad1e18f9342274ab

    • SHA256

      c23d9f39c0dbb02d5d6f3c437199efb94727713fd3e21e437a4540c27590574b

    • SHA512

      05b0f0b1181128f4ca6d391f2be3140e9431185e8c81ef22314247ba6645e87dd6ed3a9706b5ddaae743faf1b665e313b87c4cc72981152039f202bdb50363d4

    • SSDEEP

      12288:CMray90LPkj0VGnWtYXInXytlf/S7NIThoy/n6Zv88HbhBqxYf3:YyG8wVhbniL/Syp/nivpu6f

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks