General

  • Target

    383f86d82723da94b1b0e401f7752421ad6cea3377bcab74ba593be3e7337723

  • Size

    408KB

  • Sample

    230308-dkxp4sdg27

  • MD5

    51806458c9b34cdfaf52064576278345

  • SHA1

    8c74dc3340db1180e6d7bfd036fc6cb00f591eda

  • SHA256

    383f86d82723da94b1b0e401f7752421ad6cea3377bcab74ba593be3e7337723

  • SHA512

    ec955cd0cc184d634bc59b7aafae3ff10214f1c17b7a8deebe046cddd598bb04dffd1a48f6c0e3929294c9ff3d57e1e62a4dac490cbef3ab7f8431f370f8ed6e

  • SSDEEP

    6144:KUy+bnr+Fp0yN90QE1Ze9PvWsoQO9Q6qtP1JWYmzBbmayjxqpTsF1J:0MrRy90/EY2tnfmzBb61qpIF1J

Malware Config

Extracted

Family

redline

Botnet

fud

C2

193.233.20.27:4123

Attributes
  • auth_value

    cddc991efd6918ad5321d80dac884b40

Targets

    • Target

      383f86d82723da94b1b0e401f7752421ad6cea3377bcab74ba593be3e7337723

    • Size

      408KB

    • MD5

      51806458c9b34cdfaf52064576278345

    • SHA1

      8c74dc3340db1180e6d7bfd036fc6cb00f591eda

    • SHA256

      383f86d82723da94b1b0e401f7752421ad6cea3377bcab74ba593be3e7337723

    • SHA512

      ec955cd0cc184d634bc59b7aafae3ff10214f1c17b7a8deebe046cddd598bb04dffd1a48f6c0e3929294c9ff3d57e1e62a4dac490cbef3ab7f8431f370f8ed6e

    • SSDEEP

      6144:KUy+bnr+Fp0yN90QE1Ze9PvWsoQO9Q6qtP1JWYmzBbmayjxqpTsF1J:0MrRy90/EY2tnfmzBb61qpIF1J

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks