General

  • Target

    e5dd391a3e1f359e2fec01b00b856828134c4ad252782fc622c9d1c95cbfc718

  • Size

    386KB

  • Sample

    230308-mk2hqsfe78

  • MD5

    d9960fef5486a7333f3b6feb3c7b226b

  • SHA1

    29a0bc2f0109cfe285a39dc867ef95581bfa8112

  • SHA256

    e5dd391a3e1f359e2fec01b00b856828134c4ad252782fc622c9d1c95cbfc718

  • SHA512

    a62313b3ae1a6f97c775b064b9516aa8f5433266ebbdc2c6da1f6a8e23c62c8382f1db9b9164b9261934ac0c398dc20bbcf7c3c7e1330ec1f6ec849a22d1a1ab

  • SSDEEP

    6144:Kny+bnr+sp0yN90QEb8CQ/i6fmdza8YDH2D52nrpyjyU7x:1Mrwy90Z8nJmNa8IHxnFyyU7x

Malware Config

Extracted

Family

redline

Botnet

fud

C2

193.233.20.27:4123

Attributes
  • auth_value

    cddc991efd6918ad5321d80dac884b40

Targets

    • Target

      e5dd391a3e1f359e2fec01b00b856828134c4ad252782fc622c9d1c95cbfc718

    • Size

      386KB

    • MD5

      d9960fef5486a7333f3b6feb3c7b226b

    • SHA1

      29a0bc2f0109cfe285a39dc867ef95581bfa8112

    • SHA256

      e5dd391a3e1f359e2fec01b00b856828134c4ad252782fc622c9d1c95cbfc718

    • SHA512

      a62313b3ae1a6f97c775b064b9516aa8f5433266ebbdc2c6da1f6a8e23c62c8382f1db9b9164b9261934ac0c398dc20bbcf7c3c7e1330ec1f6ec849a22d1a1ab

    • SSDEEP

      6144:Kny+bnr+sp0yN90QEb8CQ/i6fmdza8YDH2D52nrpyjyU7x:1Mrwy90Z8nJmNa8IHxnFyyU7x

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks