General

  • Target

    4e0ba2178a3c33beedf6feaf4586dcdb5d38793a2d7777322b6567abe7ba381c

  • Size

    570KB

  • Sample

    230308-hp3t5see24

  • MD5

    a7d247a55d36032186de2d98e97ea0fd

  • SHA1

    075479c9f7b379d27e22fb2a45250258851dae3e

  • SHA256

    4e0ba2178a3c33beedf6feaf4586dcdb5d38793a2d7777322b6567abe7ba381c

  • SHA512

    b90151c9534c52e1b1cd740de9117c8518f15ba67d9b6054a173d023f32c41bbe13473e2ebf1d35769fd03a619e227d1b84cb869034d301069021f24b644e3e1

  • SSDEEP

    12288:xMrsy904ahimz7AuxqVTniC2hBGTD8oaaZc+:JydsVAuxYOC2XGTJ

Malware Config

Extracted

Family

redline

Botnet

fud

C2

193.233.20.27:4123

Attributes
  • auth_value

    cddc991efd6918ad5321d80dac884b40

Targets

    • Target

      4e0ba2178a3c33beedf6feaf4586dcdb5d38793a2d7777322b6567abe7ba381c

    • Size

      570KB

    • MD5

      a7d247a55d36032186de2d98e97ea0fd

    • SHA1

      075479c9f7b379d27e22fb2a45250258851dae3e

    • SHA256

      4e0ba2178a3c33beedf6feaf4586dcdb5d38793a2d7777322b6567abe7ba381c

    • SHA512

      b90151c9534c52e1b1cd740de9117c8518f15ba67d9b6054a173d023f32c41bbe13473e2ebf1d35769fd03a619e227d1b84cb869034d301069021f24b644e3e1

    • SSDEEP

      12288:xMrsy904ahimz7AuxqVTniC2hBGTD8oaaZc+:JydsVAuxYOC2XGTJ

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks