General

  • Target

    ddc5e6f356a63f6632e8dbeae3de6a9c9842b381f493f4f35bf64cf6a7b19357

  • Size

    758KB

  • Sample

    230213-a6p1lshf77

  • MD5

    cca6e3a927f2c8f22f913444f333d242

  • SHA1

    1dde1b2d2d7a42a32ae6708e627051c576786e83

  • SHA256

    ddc5e6f356a63f6632e8dbeae3de6a9c9842b381f493f4f35bf64cf6a7b19357

  • SHA512

    410f5c11f21c9a430f0bb69b8769f0c7b622b13c05e7d5d804011ede3c15bd743a3a63ab8450baee9507073c634e76c1ae79768abaff9b9ae1757226534266d9

  • SSDEEP

    12288:SMrmy907iH8iNzJR78FDOmkJeAj7fx1eRx/Nc7i+cR6DgHZt:syA0JB7oDkJnjt1eaUR6MZt

Malware Config

Extracted

Family

redline

Botnet

cr2

C2

176.113.115.17:4132

Attributes
  • auth_value

    4bf573d6f5ab16f3b5e36da6855dc128

Extracted

Family

redline

Botnet

dunm

C2

193.233.20.12:4132

Attributes
  • auth_value

    352959e3707029296ec94306d74e2334

Targets

    • Target

      ddc5e6f356a63f6632e8dbeae3de6a9c9842b381f493f4f35bf64cf6a7b19357

    • Size

      758KB

    • MD5

      cca6e3a927f2c8f22f913444f333d242

    • SHA1

      1dde1b2d2d7a42a32ae6708e627051c576786e83

    • SHA256

      ddc5e6f356a63f6632e8dbeae3de6a9c9842b381f493f4f35bf64cf6a7b19357

    • SHA512

      410f5c11f21c9a430f0bb69b8769f0c7b622b13c05e7d5d804011ede3c15bd743a3a63ab8450baee9507073c634e76c1ae79768abaff9b9ae1757226534266d9

    • SSDEEP

      12288:SMrmy907iH8iNzJR78FDOmkJeAj7fx1eRx/Nc7i+cR6DgHZt:syA0JB7oDkJnjt1eaUR6MZt

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks