General

  • Target

    eb34a2c1a29383b7192065bc05e049dca67fbebcda22f3f94fb0a76b4139a775

  • Size

    385KB

  • Sample

    230308-yh2lhagf95

  • MD5

    c0e7c9c5f2bdf0436012d5ccc08a6205

  • SHA1

    d0cb361f24f36ed76ae230705db9e558ae9fbad2

  • SHA256

    eb34a2c1a29383b7192065bc05e049dca67fbebcda22f3f94fb0a76b4139a775

  • SHA512

    e072892fc730f5bd739f8edd7d473f967ff50be735a1a82687ffe18ed826021ce3cfb01f3c01370549e343917ec6e497946f34aa1b578bd8bb6dc4738582b4a3

  • SSDEEP

    6144:KBy+bnr+kp0yN90QEv0WYkC96cgODh8h1CPLnzqRB+eBbj19zPhJEAOZXqWpUipw:PMrMy90k9zn0o78HzbEAIXMWuL

Malware Config

Extracted

Family

redline

Botnet

mango

C2

193.233.20.28:4125

Attributes
  • auth_value

    ecf79d7f5227d998a3501c972d915d23

Targets

    • Target

      eb34a2c1a29383b7192065bc05e049dca67fbebcda22f3f94fb0a76b4139a775

    • Size

      385KB

    • MD5

      c0e7c9c5f2bdf0436012d5ccc08a6205

    • SHA1

      d0cb361f24f36ed76ae230705db9e558ae9fbad2

    • SHA256

      eb34a2c1a29383b7192065bc05e049dca67fbebcda22f3f94fb0a76b4139a775

    • SHA512

      e072892fc730f5bd739f8edd7d473f967ff50be735a1a82687ffe18ed826021ce3cfb01f3c01370549e343917ec6e497946f34aa1b578bd8bb6dc4738582b4a3

    • SSDEEP

      6144:KBy+bnr+kp0yN90QEv0WYkC96cgODh8h1CPLnzqRB+eBbj19zPhJEAOZXqWpUipw:PMrMy90k9zn0o78HzbEAIXMWuL

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks