General

  • Target

    15006d9bdca99253e96af6feeb7e57eb311773b8f743db88bf9e8126d45741da

  • Size

    570KB

  • Sample

    230308-qd3c8sbg3z

  • MD5

    3277481a4ed9ba65a9ef11982913054f

  • SHA1

    ddbe014602d1fe6a298294dab8eebada9eee953c

  • SHA256

    15006d9bdca99253e96af6feeb7e57eb311773b8f743db88bf9e8126d45741da

  • SHA512

    2fedbd15ae697400058f5ebed08b9ae135aa4e63387266537c3563c2a692eba0194d0024cf4fc8358fdb4dfa1e66b066cd13d908714cf0ab711ced3fa35b8243

  • SSDEEP

    12288:sMrdy90rahimz7AuxqVs9300rMb7t7JEMk+:ZyqsVAuxYWkiyxmMk+

Malware Config

Extracted

Family

redline

Botnet

mango

C2

193.233.20.28:4125

Attributes
  • auth_value

    ecf79d7f5227d998a3501c972d915d23

Targets

    • Target

      15006d9bdca99253e96af6feeb7e57eb311773b8f743db88bf9e8126d45741da

    • Size

      570KB

    • MD5

      3277481a4ed9ba65a9ef11982913054f

    • SHA1

      ddbe014602d1fe6a298294dab8eebada9eee953c

    • SHA256

      15006d9bdca99253e96af6feeb7e57eb311773b8f743db88bf9e8126d45741da

    • SHA512

      2fedbd15ae697400058f5ebed08b9ae135aa4e63387266537c3563c2a692eba0194d0024cf4fc8358fdb4dfa1e66b066cd13d908714cf0ab711ced3fa35b8243

    • SSDEEP

      12288:sMrdy90rahimz7AuxqVs9300rMb7t7JEMk+:ZyqsVAuxYWkiyxmMk+

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks