General

  • Target

    363a79b0d8826cd09a9b95d8a47141d909c6291e0ff1edab6d94be29842a1011

  • Size

    550KB

  • Sample

    230308-db677adf82

  • MD5

    a341aea8664f3be9a7b53accef0e6d51

  • SHA1

    346e5f32cb27df60ae2eff124024d293c9208a74

  • SHA256

    363a79b0d8826cd09a9b95d8a47141d909c6291e0ff1edab6d94be29842a1011

  • SHA512

    a46af431a64dc5d0e65c0c31eb54c8080196d23b483ecbc719a42d02f87aa143a4dec68dd309c1873ca50f0a75bf94be79d8ef2fd92ca626c7d25973eea0470e

  • SSDEEP

    12288:pMrKy90Hahimz7AuxqVlVWvo6dfmG85DXHhzjGJ:3yOsVAuxYj+6DlK

Malware Config

Extracted

Family

redline

Botnet

fud

C2

193.233.20.27:4123

Attributes
  • auth_value

    cddc991efd6918ad5321d80dac884b40

Targets

    • Target

      363a79b0d8826cd09a9b95d8a47141d909c6291e0ff1edab6d94be29842a1011

    • Size

      550KB

    • MD5

      a341aea8664f3be9a7b53accef0e6d51

    • SHA1

      346e5f32cb27df60ae2eff124024d293c9208a74

    • SHA256

      363a79b0d8826cd09a9b95d8a47141d909c6291e0ff1edab6d94be29842a1011

    • SHA512

      a46af431a64dc5d0e65c0c31eb54c8080196d23b483ecbc719a42d02f87aa143a4dec68dd309c1873ca50f0a75bf94be79d8ef2fd92ca626c7d25973eea0470e

    • SSDEEP

      12288:pMrKy90Hahimz7AuxqVlVWvo6dfmG85DXHhzjGJ:3yOsVAuxYj+6DlK

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks