General

  • Target

    924c8b9a270a5407d8f9516d9bc641479f21f0befc99a300f731aaef05633813

  • Size

    577KB

  • Sample

    230309-cz2f6sac33

  • MD5

    4170dfeaae81edad6ad7197cd2b39ed1

  • SHA1

    2057f7e7c94cd67dced75c770b77c0060ed42997

  • SHA256

    924c8b9a270a5407d8f9516d9bc641479f21f0befc99a300f731aaef05633813

  • SHA512

    a52259ff14868084947405a9174cb96d382f9169904cfc948f2690abd256c35a5880d3d0fb20377f20ccc80b51c34ea888cfec6969f4fbaccd47c33011675fbb

  • SSDEEP

    12288:VMrfy90Bahimz7AuxqVOt/9ZgF6kjUSzeO65tUA0:6y0sVAuxYoggkwieO65WA0

Malware Config

Extracted

Family

redline

Botnet

mango

C2

193.233.20.28:4125

Attributes
  • auth_value

    ecf79d7f5227d998a3501c972d915d23

Targets

    • Target

      924c8b9a270a5407d8f9516d9bc641479f21f0befc99a300f731aaef05633813

    • Size

      577KB

    • MD5

      4170dfeaae81edad6ad7197cd2b39ed1

    • SHA1

      2057f7e7c94cd67dced75c770b77c0060ed42997

    • SHA256

      924c8b9a270a5407d8f9516d9bc641479f21f0befc99a300f731aaef05633813

    • SHA512

      a52259ff14868084947405a9174cb96d382f9169904cfc948f2690abd256c35a5880d3d0fb20377f20ccc80b51c34ea888cfec6969f4fbaccd47c33011675fbb

    • SSDEEP

      12288:VMrfy90Bahimz7AuxqVOt/9ZgF6kjUSzeO65tUA0:6y0sVAuxYoggkwieO65WA0

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks