General

  • Target

    17a8c2a3b4cb9d077b68a56dc2433590df8d5ad909c8e72b6003b9d89e0f490e

  • Size

    409KB

  • Sample

    230309-jc11fsaa7x

  • MD5

    6269eb4e8033b3dafed28361f2682e96

  • SHA1

    2b8f870d51a71fb35515c64df037fd87d1bdab6f

  • SHA256

    17a8c2a3b4cb9d077b68a56dc2433590df8d5ad909c8e72b6003b9d89e0f490e

  • SHA512

    69f5196f60af4f717539d76cdf3a24a94e56292997316ab77e485133eef3c21c067aeb3caa09121885dbcd9ee1e843eb5b2bd9fff57394196706e20ed66c1e2f

  • SSDEEP

    6144:KOy+bnr+Vp0yN90QEM+ghTv6KSIlMnO+L3fhZYsyNCW9OZhVm9zXzFk4:qMrpy90cTCERuHHyXEyzxp

Malware Config

Extracted

Family

redline

Botnet

mango

C2

193.233.20.28:4125

Attributes
  • auth_value

    ecf79d7f5227d998a3501c972d915d23

Targets

    • Target

      17a8c2a3b4cb9d077b68a56dc2433590df8d5ad909c8e72b6003b9d89e0f490e

    • Size

      409KB

    • MD5

      6269eb4e8033b3dafed28361f2682e96

    • SHA1

      2b8f870d51a71fb35515c64df037fd87d1bdab6f

    • SHA256

      17a8c2a3b4cb9d077b68a56dc2433590df8d5ad909c8e72b6003b9d89e0f490e

    • SHA512

      69f5196f60af4f717539d76cdf3a24a94e56292997316ab77e485133eef3c21c067aeb3caa09121885dbcd9ee1e843eb5b2bd9fff57394196706e20ed66c1e2f

    • SSDEEP

      6144:KOy+bnr+Vp0yN90QEM+ghTv6KSIlMnO+L3fhZYsyNCW9OZhVm9zXzFk4:qMrpy90cTCERuHHyXEyzxp

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks