General

  • Target

    50bdc1aec8d5826dd30eb958b7c014401cc5dc1b82fac389d957f23386c41c61

  • Size

    387KB

  • Sample

    230308-qejyaaca9z

  • MD5

    e7a8105aada8c4638c311add7f783d68

  • SHA1

    d03861372db588db1acd478d884faf4c63ef4362

  • SHA256

    50bdc1aec8d5826dd30eb958b7c014401cc5dc1b82fac389d957f23386c41c61

  • SHA512

    6dea9f6ad0273fc1a821ec60d8f9d40e1d5872b38d7c9391f6a0be9c76bed2652bc7252e8d908866db3dc9d1f6f7ed6d567ab8b25feb8a3a51769e10be6c590a

  • SSDEEP

    6144:KNy+bnr+ip0yN90QEHAJwN/eRKoEbN2D6ZkJBvYb452tuMHZfzeEwBYZqmkFVdXi:7Mr6y90uJ8/hfwlabbtJ9zwYZqmkFVI

Malware Config

Extracted

Family

redline

Botnet

mango

C2

193.233.20.28:4125

Attributes
  • auth_value

    ecf79d7f5227d998a3501c972d915d23

Targets

    • Target

      50bdc1aec8d5826dd30eb958b7c014401cc5dc1b82fac389d957f23386c41c61

    • Size

      387KB

    • MD5

      e7a8105aada8c4638c311add7f783d68

    • SHA1

      d03861372db588db1acd478d884faf4c63ef4362

    • SHA256

      50bdc1aec8d5826dd30eb958b7c014401cc5dc1b82fac389d957f23386c41c61

    • SHA512

      6dea9f6ad0273fc1a821ec60d8f9d40e1d5872b38d7c9391f6a0be9c76bed2652bc7252e8d908866db3dc9d1f6f7ed6d567ab8b25feb8a3a51769e10be6c590a

    • SSDEEP

      6144:KNy+bnr+ip0yN90QEHAJwN/eRKoEbN2D6ZkJBvYb452tuMHZfzeEwBYZqmkFVdXi:7Mr6y90uJ8/hfwlabbtJ9zwYZqmkFVI

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks