General

  • Target

    7b94c8c56ef534a80e69d5b8937426c036712841d6074f46f6bfb7f9f0acc97c

  • Size

    562KB

  • Sample

    230306-wa2kesdg7t

  • MD5

    8a188915be02f6ee241c4fe4ce509dd3

  • SHA1

    a27feef572a40df51dd8e9cb15e818c1128ecea8

  • SHA256

    7b94c8c56ef534a80e69d5b8937426c036712841d6074f46f6bfb7f9f0acc97c

  • SHA512

    557da5b8cc02d58eeefa966323a8d8c2e118c2c3b52f92c71dd5490071745af0badf580d79241f4563b7cf8d4e7be8fabaf5ed5d46ad86f5fc065357ed160230

  • SSDEEP

    12288:tMrNy90FXBfkAsmmGbuv8S02SwxOoUYYyG0WcDvLlOD8E5psL39O1MCF5R:kyafkFh78pGwoW0WcDjlOD/aY1p

Malware Config

Extracted

Family

redline

Botnet

fabio

C2

193.233.20.27:4123

Attributes
  • auth_value

    56b82736c3f56b13be8e64c87d2cf9e5

Extracted

Family

redline

Botnet

fud

C2

193.233.20.27:4123

Attributes
  • auth_value

    cddc991efd6918ad5321d80dac884b40

Targets

    • Target

      7b94c8c56ef534a80e69d5b8937426c036712841d6074f46f6bfb7f9f0acc97c

    • Size

      562KB

    • MD5

      8a188915be02f6ee241c4fe4ce509dd3

    • SHA1

      a27feef572a40df51dd8e9cb15e818c1128ecea8

    • SHA256

      7b94c8c56ef534a80e69d5b8937426c036712841d6074f46f6bfb7f9f0acc97c

    • SHA512

      557da5b8cc02d58eeefa966323a8d8c2e118c2c3b52f92c71dd5490071745af0badf580d79241f4563b7cf8d4e7be8fabaf5ed5d46ad86f5fc065357ed160230

    • SSDEEP

      12288:tMrNy90FXBfkAsmmGbuv8S02SwxOoUYYyG0WcDvLlOD8E5psL39O1MCF5R:kyafkFh78pGwoW0WcDjlOD/aY1p

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks