General

  • Target

    d3671860366fd88f44ad2fced1d56a69e5dcb7d276fca5f9b6ed1136b3d9beda

  • Size

    577KB

  • Sample

    230309-dh6j8shb9s

  • MD5

    2cadd06e6d90e68120b518506dbce8c7

  • SHA1

    197bea7c66ba034032d8c3b4848a4f3ee2614a55

  • SHA256

    d3671860366fd88f44ad2fced1d56a69e5dcb7d276fca5f9b6ed1136b3d9beda

  • SHA512

    2fd12581504f0373c08c6c035fef40ae73f898e3901d4fe5cd7957efb178346e9953a01b1343595ba0dcef759e044f64d7dad3071af7cf9d999e4a4318673162

  • SSDEEP

    12288:8MrGy90Mahimz7AuxqVtc0kyjYtPkxhGneUpuI1fAWd44:CyZsVAuxYyustPkSeUMIxAy

Malware Config

Extracted

Family

redline

Botnet

mango

C2

193.233.20.28:4125

Attributes
  • auth_value

    ecf79d7f5227d998a3501c972d915d23

Targets

    • Target

      d3671860366fd88f44ad2fced1d56a69e5dcb7d276fca5f9b6ed1136b3d9beda

    • Size

      577KB

    • MD5

      2cadd06e6d90e68120b518506dbce8c7

    • SHA1

      197bea7c66ba034032d8c3b4848a4f3ee2614a55

    • SHA256

      d3671860366fd88f44ad2fced1d56a69e5dcb7d276fca5f9b6ed1136b3d9beda

    • SHA512

      2fd12581504f0373c08c6c035fef40ae73f898e3901d4fe5cd7957efb178346e9953a01b1343595ba0dcef759e044f64d7dad3071af7cf9d999e4a4318673162

    • SSDEEP

      12288:8MrGy90Mahimz7AuxqVtc0kyjYtPkxhGneUpuI1fAWd44:CyZsVAuxYyustPkSeUMIxAy

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks