General

  • Target

    c3ee947a7a3292db6fe400dbb7dc82c38116645e0aaf47903f5048ec57a00d1a

  • Size

    393KB

  • Sample

    230309-fh6w4she8s

  • MD5

    8768f619733cf8bddf11505e98672b26

  • SHA1

    c05720edd1a1e967113724ed5adc7c26694c9ac8

  • SHA256

    c3ee947a7a3292db6fe400dbb7dc82c38116645e0aaf47903f5048ec57a00d1a

  • SHA512

    c470aa32f12073271b5f5e702b5ebb4327a84302c4f7f6ea0c75e2ae97d04fc888e387ff0cf47401b4fdad63de01ca12ca4a93e27144b9ce87d5e670d368ec94

  • SSDEEP

    6144:KNy+bnr+Up0yN90QEKuwQDQix1bE4t5B9uo2D8hiu6B4v6uO02i5E:LMrky904QUiTEa9uuV6BcSCE

Malware Config

Extracted

Family

redline

Botnet

mango

C2

193.233.20.28:4125

Attributes
  • auth_value

    ecf79d7f5227d998a3501c972d915d23

Targets

    • Target

      c3ee947a7a3292db6fe400dbb7dc82c38116645e0aaf47903f5048ec57a00d1a

    • Size

      393KB

    • MD5

      8768f619733cf8bddf11505e98672b26

    • SHA1

      c05720edd1a1e967113724ed5adc7c26694c9ac8

    • SHA256

      c3ee947a7a3292db6fe400dbb7dc82c38116645e0aaf47903f5048ec57a00d1a

    • SHA512

      c470aa32f12073271b5f5e702b5ebb4327a84302c4f7f6ea0c75e2ae97d04fc888e387ff0cf47401b4fdad63de01ca12ca4a93e27144b9ce87d5e670d368ec94

    • SSDEEP

      6144:KNy+bnr+Up0yN90QEKuwQDQix1bE4t5B9uo2D8hiu6B4v6uO02i5E:LMrky904QUiTEa9uuV6BcSCE

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks