General

  • Target

    f3a88c609b8915a49e49a131fb84167799e2b21d0000e0c0ffa0ad7862e8d29e

  • Size

    569KB

  • Sample

    230309-jq9jraab6w

  • MD5

    8a84691658a8df2239a1d35fdafe464a

  • SHA1

    de63dd900056e74fe361a59e27aebf9a9d061f1b

  • SHA256

    f3a88c609b8915a49e49a131fb84167799e2b21d0000e0c0ffa0ad7862e8d29e

  • SHA512

    7e55598fa8bcc47812dd36e288513ab0cb6c29794265f86c4c2f626395fa0bed6c3dd4d042d56eb0dc1b8af3fd481768da17edbc97db7067d50e413748958e1f

  • SSDEEP

    12288:HMrPy90Eahimz7AuxqVZyeLXCnFyjzXLx5A46A3JBO:4yxsVAuxYnXaK/x5APgJBO

Malware Config

Extracted

Family

redline

Botnet

mango

C2

193.233.20.28:4125

Attributes
  • auth_value

    ecf79d7f5227d998a3501c972d915d23

Targets

    • Target

      f3a88c609b8915a49e49a131fb84167799e2b21d0000e0c0ffa0ad7862e8d29e

    • Size

      569KB

    • MD5

      8a84691658a8df2239a1d35fdafe464a

    • SHA1

      de63dd900056e74fe361a59e27aebf9a9d061f1b

    • SHA256

      f3a88c609b8915a49e49a131fb84167799e2b21d0000e0c0ffa0ad7862e8d29e

    • SHA512

      7e55598fa8bcc47812dd36e288513ab0cb6c29794265f86c4c2f626395fa0bed6c3dd4d042d56eb0dc1b8af3fd481768da17edbc97db7067d50e413748958e1f

    • SSDEEP

      12288:HMrPy90Eahimz7AuxqVZyeLXCnFyjzXLx5A46A3JBO:4yxsVAuxYnXaK/x5APgJBO

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks