General

  • Target

    daf644d10dbbb0d6b2164d96a57c41f11a591bb2162c60626f779a8d56a3a618

  • Size

    766KB

  • Sample

    230212-hteywaad82

  • MD5

    ec9ea46cd35db68dd5d21bdb7087ce74

  • SHA1

    b8067a2ee0547fac295e11884554a9815dfb8181

  • SHA256

    daf644d10dbbb0d6b2164d96a57c41f11a591bb2162c60626f779a8d56a3a618

  • SHA512

    8783db9e661e9f0bf4fa55544a5ceab5012ea298d7d66f90012c5964b1518e2429ee06a4376187c2571af3fedeb114bc6dfd36e508e107dafdc13c528ecd9453

  • SSDEEP

    12288:bMrny90+yEaSKprM+d3aCpMriaT7+Be0DDMMbm1o1yHOByLDNMTzZA3:EyHyEwrh37aT7+Rh2oIukZMTzK3

Malware Config

Extracted

Family

redline

Botnet

crypt1

C2

176.113.115.17:4132

Attributes
  • auth_value

    2e2ca7bbceaa9f98252a6f9fc0e6fa86

Extracted

Family

redline

Botnet

dunm

C2

193.233.20.12:4132

Attributes
  • auth_value

    352959e3707029296ec94306d74e2334

Targets

    • Target

      daf644d10dbbb0d6b2164d96a57c41f11a591bb2162c60626f779a8d56a3a618

    • Size

      766KB

    • MD5

      ec9ea46cd35db68dd5d21bdb7087ce74

    • SHA1

      b8067a2ee0547fac295e11884554a9815dfb8181

    • SHA256

      daf644d10dbbb0d6b2164d96a57c41f11a591bb2162c60626f779a8d56a3a618

    • SHA512

      8783db9e661e9f0bf4fa55544a5ceab5012ea298d7d66f90012c5964b1518e2429ee06a4376187c2571af3fedeb114bc6dfd36e508e107dafdc13c528ecd9453

    • SSDEEP

      12288:bMrny90+yEaSKprM+d3aCpMriaT7+Be0DDMMbm1o1yHOByLDNMTzZA3:EyHyEwrh37aT7+Rh2oIukZMTzK3

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks