General

  • Target

    8ccca57f2746dc498efdd0520a352d1a07c241243905330248c3f36ad9056ce4

  • Size

    770KB

  • Sample

    230213-l3926ace34

  • MD5

    e5c9a8bc057e4d386d90d1e6bdae62ec

  • SHA1

    5fbafda26bb5fe9d28ec4bfdecfa3ce4ea9b1e34

  • SHA256

    8ccca57f2746dc498efdd0520a352d1a07c241243905330248c3f36ad9056ce4

  • SHA512

    14fd8498c01676058c044a2151af95dd04f11b43591680269c98fec6efb915a264874895063ddc575efb75fd34e242d34ba9bee2ed8a1ec0c095f415818dada8

  • SSDEEP

    12288:9Mrdy90A5bKtvbDIbHnfGM5RTtfW4u+H8eCE53QK3LyQEdaf/nAz00YLQxw:kyT5b2DIyi3tTH8eJhD7Xn4TYL

Malware Config

Extracted

Family

redline

Botnet

cr2

C2

176.113.115.17:4132

Attributes
  • auth_value

    4bf573d6f5ab16f3b5e36da6855dc128

Extracted

Family

redline

Botnet

dunm

C2

193.233.20.12:4132

Attributes
  • auth_value

    352959e3707029296ec94306d74e2334

Targets

    • Target

      8ccca57f2746dc498efdd0520a352d1a07c241243905330248c3f36ad9056ce4

    • Size

      770KB

    • MD5

      e5c9a8bc057e4d386d90d1e6bdae62ec

    • SHA1

      5fbafda26bb5fe9d28ec4bfdecfa3ce4ea9b1e34

    • SHA256

      8ccca57f2746dc498efdd0520a352d1a07c241243905330248c3f36ad9056ce4

    • SHA512

      14fd8498c01676058c044a2151af95dd04f11b43591680269c98fec6efb915a264874895063ddc575efb75fd34e242d34ba9bee2ed8a1ec0c095f415818dada8

    • SSDEEP

      12288:9Mrdy90A5bKtvbDIbHnfGM5RTtfW4u+H8eCE53QK3LyQEdaf/nAz00YLQxw:kyT5b2DIyi3tTH8eJhD7Xn4TYL

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks