General

  • Target

    f7e3104cfcf57f6c3f7b58a1c4b918f0b55270ddd85fe016cd407bbd347c269a

  • Size

    568KB

  • Sample

    230308-zph86sga2t

  • MD5

    5b5f03025f9dcb9595f8902d281518b8

  • SHA1

    bdcd84e8e797716728e9619f275579dd632b8417

  • SHA256

    f7e3104cfcf57f6c3f7b58a1c4b918f0b55270ddd85fe016cd407bbd347c269a

  • SHA512

    acba4760599fa6f6601a5d9f64097847bc728b28d11e58d8ee3d9d2692509127674405a12fba2a7aaef68daddd493db5874a1e406c5b4964cdfd02c1c7bb50fe

  • SSDEEP

    12288:8MrIy90r5ahimz7AuxqV4t9+j8zJA7J4Fh3AxMt01UbO2r8Yqw:cyk5sVAuxYJj8QJs3Aetjxr4w

Malware Config

Extracted

Family

redline

Botnet

mango

C2

193.233.20.28:4125

Attributes
  • auth_value

    ecf79d7f5227d998a3501c972d915d23

Targets

    • Target

      f7e3104cfcf57f6c3f7b58a1c4b918f0b55270ddd85fe016cd407bbd347c269a

    • Size

      568KB

    • MD5

      5b5f03025f9dcb9595f8902d281518b8

    • SHA1

      bdcd84e8e797716728e9619f275579dd632b8417

    • SHA256

      f7e3104cfcf57f6c3f7b58a1c4b918f0b55270ddd85fe016cd407bbd347c269a

    • SHA512

      acba4760599fa6f6601a5d9f64097847bc728b28d11e58d8ee3d9d2692509127674405a12fba2a7aaef68daddd493db5874a1e406c5b4964cdfd02c1c7bb50fe

    • SSDEEP

      12288:8MrIy90r5ahimz7AuxqV4t9+j8zJA7J4Fh3AxMt01UbO2r8Yqw:cyk5sVAuxYJj8QJs3Aetjxr4w

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks