General

  • Target

    3146307923edc153817388d5191b0e2dd3fdbce3860d77d7568d0f5defe3c85a

  • Size

    409KB

  • Sample

    230309-gy3p3aah58

  • MD5

    fd87ae80fe28e565d5559a3474e51e2a

  • SHA1

    7c5bb94c50ebf16bff6073f4dbaae8b932f611cb

  • SHA256

    3146307923edc153817388d5191b0e2dd3fdbce3860d77d7568d0f5defe3c85a

  • SHA512

    69109e256bf9d43c353ed9ede4ee69fe1edd33ff3befb7b09b1c699e1cf78675358ced74516f89420f234d104e5c15f21dc722c8e935b78bde2c3bc28d8dbdbb

  • SSDEEP

    12288:xMrvy900rqT3SQsdygA3EgV9N0UGNag2ukGv:6yZCsdmPV9N0UGNackGv

Malware Config

Extracted

Family

redline

Botnet

mango

C2

193.233.20.28:4125

Attributes
  • auth_value

    ecf79d7f5227d998a3501c972d915d23

Targets

    • Target

      3146307923edc153817388d5191b0e2dd3fdbce3860d77d7568d0f5defe3c85a

    • Size

      409KB

    • MD5

      fd87ae80fe28e565d5559a3474e51e2a

    • SHA1

      7c5bb94c50ebf16bff6073f4dbaae8b932f611cb

    • SHA256

      3146307923edc153817388d5191b0e2dd3fdbce3860d77d7568d0f5defe3c85a

    • SHA512

      69109e256bf9d43c353ed9ede4ee69fe1edd33ff3befb7b09b1c699e1cf78675358ced74516f89420f234d104e5c15f21dc722c8e935b78bde2c3bc28d8dbdbb

    • SSDEEP

      12288:xMrvy900rqT3SQsdygA3EgV9N0UGNag2ukGv:6yZCsdmPV9N0UGNackGv

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks