General

  • Target

    7dbc1fdf46317260beae99721a461e2321a4127846b42f4e8027171ec2d3234c

  • Size

    763KB

  • Sample

    230213-wx49tsfb27

  • MD5

    a605fdeeac8eab9b7667c9e8e4a8fd1c

  • SHA1

    45e6e1d59978e75d573c77b8112923dc24afb82a

  • SHA256

    7dbc1fdf46317260beae99721a461e2321a4127846b42f4e8027171ec2d3234c

  • SHA512

    025e21d3396d32ee8c24fa31939e2f1630c58a1f321e8ac8cd55a6853cd2206f7d49e865f38c56f5f5c9705540113411649a9ec27f97fcb3ffb9d2718d209e94

  • SSDEEP

    12288:iMrTy905a0soiKwnZ2XkT1RmRJcKVRUZWpBo/lHlM0FkmJScmICxVqUDNpuhNjA:py6ooQnZGkhRCSKVK8m8UDKiUhpoA

Malware Config

Extracted

Family

redline

Botnet

romik

C2

193.233.20.12:4132

Attributes
  • auth_value

    8fb78d2889ba0ca42678b59b884e88ff

Extracted

Family

redline

Botnet

dunm

C2

193.233.20.12:4132

Attributes
  • auth_value

    352959e3707029296ec94306d74e2334

Extracted

Family

redline

Botnet

cr2

C2

176.113.115.17:4132

Attributes
  • auth_value

    4bf573d6f5ab16f3b5e36da6855dc128

Targets

    • Target

      7dbc1fdf46317260beae99721a461e2321a4127846b42f4e8027171ec2d3234c

    • Size

      763KB

    • MD5

      a605fdeeac8eab9b7667c9e8e4a8fd1c

    • SHA1

      45e6e1d59978e75d573c77b8112923dc24afb82a

    • SHA256

      7dbc1fdf46317260beae99721a461e2321a4127846b42f4e8027171ec2d3234c

    • SHA512

      025e21d3396d32ee8c24fa31939e2f1630c58a1f321e8ac8cd55a6853cd2206f7d49e865f38c56f5f5c9705540113411649a9ec27f97fcb3ffb9d2718d209e94

    • SSDEEP

      12288:iMrTy905a0soiKwnZ2XkT1RmRJcKVRUZWpBo/lHlM0FkmJScmICxVqUDNpuhNjA:py6ooQnZGkhRCSKVK8m8UDKiUhpoA

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks