General

  • Target

    a1761b364b6267e3a27574c98d3e4bfab9ad17c0a2d9e6ddb9de6586e162a327

  • Size

    408KB

  • Sample

    230308-et8dmsdh94

  • MD5

    7f4cbf987d61d686c7cf2d4149ad016f

  • SHA1

    71891bd18ef0c50a69483ad43fa4583a77d90383

  • SHA256

    a1761b364b6267e3a27574c98d3e4bfab9ad17c0a2d9e6ddb9de6586e162a327

  • SHA512

    68f6d221172563e0510ca7fd0b93d1cb2f2b14fc9093399860437284ff25883d922b182f7287282a484641f315c086fac0ae796c7f1eba0996b07a981ea3f7e8

  • SSDEEP

    6144:Kgy+bnr+dp0yN90QEKZe9PvWsoQO9Q6qtP1JWYmzBbmayjxqpTsF15:EMr5y900EY2tnfmzBb61qpIF15

Malware Config

Extracted

Family

redline

Botnet

fud

C2

193.233.20.27:4123

Attributes
  • auth_value

    cddc991efd6918ad5321d80dac884b40

Targets

    • Target

      a1761b364b6267e3a27574c98d3e4bfab9ad17c0a2d9e6ddb9de6586e162a327

    • Size

      408KB

    • MD5

      7f4cbf987d61d686c7cf2d4149ad016f

    • SHA1

      71891bd18ef0c50a69483ad43fa4583a77d90383

    • SHA256

      a1761b364b6267e3a27574c98d3e4bfab9ad17c0a2d9e6ddb9de6586e162a327

    • SHA512

      68f6d221172563e0510ca7fd0b93d1cb2f2b14fc9093399860437284ff25883d922b182f7287282a484641f315c086fac0ae796c7f1eba0996b07a981ea3f7e8

    • SSDEEP

      6144:Kgy+bnr+dp0yN90QEKZe9PvWsoQO9Q6qtP1JWYmzBbmayjxqpTsF15:EMr5y900EY2tnfmzBb61qpIF15

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks