General

  • Target

    3987e2b8165282c2119c4912cfaefed38992a6738420a74ae6d7fadaab74d70d

  • Size

    408KB

  • Sample

    230308-esrz9sdh88

  • MD5

    769b1a9a558cf8f2f26cc6539beeebe0

  • SHA1

    536cc0733aeab78ae5fa181274df4442c1ef0996

  • SHA256

    3987e2b8165282c2119c4912cfaefed38992a6738420a74ae6d7fadaab74d70d

  • SHA512

    4f1dd6cda2a4279d9f3af049d9985a99da22076c36e3ae3237c38d563f5b425ed0b4480a8533eaa10abe614b0c1a89f28622785707fc0c3a37478a75c801af8d

  • SSDEEP

    6144:KYy+bnr+Np0yN90QEVZe9PvWsoQO9Q6qtP1JWYmzBbmayjxqpTsF1w:MMrxy90jEY2tnfmzBb61qpIF1w

Malware Config

Extracted

Family

redline

Botnet

fud

C2

193.233.20.27:4123

Attributes
  • auth_value

    cddc991efd6918ad5321d80dac884b40

Targets

    • Target

      3987e2b8165282c2119c4912cfaefed38992a6738420a74ae6d7fadaab74d70d

    • Size

      408KB

    • MD5

      769b1a9a558cf8f2f26cc6539beeebe0

    • SHA1

      536cc0733aeab78ae5fa181274df4442c1ef0996

    • SHA256

      3987e2b8165282c2119c4912cfaefed38992a6738420a74ae6d7fadaab74d70d

    • SHA512

      4f1dd6cda2a4279d9f3af049d9985a99da22076c36e3ae3237c38d563f5b425ed0b4480a8533eaa10abe614b0c1a89f28622785707fc0c3a37478a75c801af8d

    • SSDEEP

      6144:KYy+bnr+Np0yN90QEVZe9PvWsoQO9Q6qtP1JWYmzBbmayjxqpTsF1w:MMrxy90jEY2tnfmzBb61qpIF1w

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks