General

  • Target

    8fe82717a60af8b81794f669b7bb1b31a1367d0f9b3741c06a41644690c576f1

  • Size

    385KB

  • Sample

    230308-v1c43sfb3x

  • MD5

    154cf4067bb55b0e0803eef4fa6fc506

  • SHA1

    35f56ae2272879a965638fc0f7ff8dcb8a9eeea1

  • SHA256

    8fe82717a60af8b81794f669b7bb1b31a1367d0f9b3741c06a41644690c576f1

  • SHA512

    d0c04102a724d49a49912b9026eee9d0da6e39c57ae0ff788e98765fda619438f142f3313270c91a4d7b17c1ffa6eb5fcfbfc39f433dcff45aa47a7fd489efe3

  • SSDEEP

    6144:K/y+bnr+up0yN90QEcC3NbeS17JpvGGqjbXIAjh6kyAuGy/qnZWP9:hMryy90fNt17JpJqjbYC6oyC8P9

Malware Config

Extracted

Family

redline

Botnet

mango

C2

193.233.20.28:4125

Attributes
  • auth_value

    ecf79d7f5227d998a3501c972d915d23

Targets

    • Target

      8fe82717a60af8b81794f669b7bb1b31a1367d0f9b3741c06a41644690c576f1

    • Size

      385KB

    • MD5

      154cf4067bb55b0e0803eef4fa6fc506

    • SHA1

      35f56ae2272879a965638fc0f7ff8dcb8a9eeea1

    • SHA256

      8fe82717a60af8b81794f669b7bb1b31a1367d0f9b3741c06a41644690c576f1

    • SHA512

      d0c04102a724d49a49912b9026eee9d0da6e39c57ae0ff788e98765fda619438f142f3313270c91a4d7b17c1ffa6eb5fcfbfc39f433dcff45aa47a7fd489efe3

    • SSDEEP

      6144:K/y+bnr+up0yN90QEcC3NbeS17JpvGGqjbXIAjh6kyAuGy/qnZWP9:hMryy90fNt17JpJqjbYC6oyC8P9

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks