General

  • Target

    655286e34e199c7dff8c116dffcf10955c771aae3f863d2c2ef0d4a4d2ba3094

  • Size

    409KB

  • Sample

    230309-hhb3vahh3z

  • MD5

    b7bf63b17b25fe36d82f5bb3c5e8a207

  • SHA1

    a8830fa940a17d3abc9f65f6dc2f6e0906574785

  • SHA256

    655286e34e199c7dff8c116dffcf10955c771aae3f863d2c2ef0d4a4d2ba3094

  • SHA512

    e7ade6e0634dfd72d2a14cdbef0dcf736f92fde1bf73a9a96c1e6c2b38aff098d2bf7c42e49d2bd1b43ce31dd5f868862fe581cfe0741e48db4e6a17794f5db2

  • SSDEEP

    12288:TMrny90HrqT3SQsdygA3EgV9N0UGNag2ukGS:oysCsdmPV9N0UGNackGS

Malware Config

Extracted

Family

redline

Botnet

mango

C2

193.233.20.28:4125

Attributes
  • auth_value

    ecf79d7f5227d998a3501c972d915d23

Targets

    • Target

      655286e34e199c7dff8c116dffcf10955c771aae3f863d2c2ef0d4a4d2ba3094

    • Size

      409KB

    • MD5

      b7bf63b17b25fe36d82f5bb3c5e8a207

    • SHA1

      a8830fa940a17d3abc9f65f6dc2f6e0906574785

    • SHA256

      655286e34e199c7dff8c116dffcf10955c771aae3f863d2c2ef0d4a4d2ba3094

    • SHA512

      e7ade6e0634dfd72d2a14cdbef0dcf736f92fde1bf73a9a96c1e6c2b38aff098d2bf7c42e49d2bd1b43ce31dd5f868862fe581cfe0741e48db4e6a17794f5db2

    • SSDEEP

      12288:TMrny90HrqT3SQsdygA3EgV9N0UGNag2ukGS:oysCsdmPV9N0UGNackGS

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks