General

  • Target

    4b769b8c78ea3519af383642de23308cbc0dd4edd4a862d6fc789c1f4a40ca7b

  • Size

    579KB

  • Sample

    230308-cdd4rada2t

  • MD5

    75c90fc6da299e7aa0f6ead3e042e07e

  • SHA1

    807416d16567805c4ced6df71aafe50e33df0f5c

  • SHA256

    4b769b8c78ea3519af383642de23308cbc0dd4edd4a862d6fc789c1f4a40ca7b

  • SHA512

    f38aa49c3dd2746dfecfbd0d57d846da5e42b893a0de52b21fb33a51349e7d8476cab7f6d929e1aa586c04db0c6d8510c3e55bb726a9fcd8dce2462e3b247d19

  • SSDEEP

    12288:7Mrxy90TdBLaeVFjaaSPMuJAfsTOO+kbu1dV/TKiGXJQr:qy6dBGeVViJAfsi3euR2iG5G

Malware Config

Extracted

Family

redline

Botnet

fud

C2

193.233.20.27:4123

Attributes
  • auth_value

    cddc991efd6918ad5321d80dac884b40

Targets

    • Target

      4b769b8c78ea3519af383642de23308cbc0dd4edd4a862d6fc789c1f4a40ca7b

    • Size

      579KB

    • MD5

      75c90fc6da299e7aa0f6ead3e042e07e

    • SHA1

      807416d16567805c4ced6df71aafe50e33df0f5c

    • SHA256

      4b769b8c78ea3519af383642de23308cbc0dd4edd4a862d6fc789c1f4a40ca7b

    • SHA512

      f38aa49c3dd2746dfecfbd0d57d846da5e42b893a0de52b21fb33a51349e7d8476cab7f6d929e1aa586c04db0c6d8510c3e55bb726a9fcd8dce2462e3b247d19

    • SSDEEP

      12288:7Mrxy90TdBLaeVFjaaSPMuJAfsTOO+kbu1dV/TKiGXJQr:qy6dBGeVViJAfsi3euR2iG5G

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks