General

  • Target

    8a0bca0b97c29250f21f4dadc11a4bfbc1a8b00df4765ae367b0526638bd3be2

  • Size

    409KB

  • Sample

    230309-lema7abf89

  • MD5

    7417d9e889d5b1ea95cafed96ccd7afb

  • SHA1

    ea6456ba15fe7e39d2abac5fda0cd28621c2b1ba

  • SHA256

    8a0bca0b97c29250f21f4dadc11a4bfbc1a8b00df4765ae367b0526638bd3be2

  • SHA512

    03546ecc8079b72b0f01853e6ad841dfbe0d1d8b44178e0cfa879a54faebbcdfbd12aae1a30ecdaa303118a481527c6e1a4485edb3b3e2ea954e6beecab8cd09

  • SSDEEP

    6144:KNy+bnr+0p0yN90QEm/5yh+1b0KUZk0dCsiglMWfuQQ5J9BIYGqTL2OEoaLFcIAY:/MrIy902wh+l0Higlvud1b32OEo/Ir

Malware Config

Extracted

Family

redline

Botnet

mango

C2

193.233.20.28:4125

Attributes
  • auth_value

    ecf79d7f5227d998a3501c972d915d23

Targets

    • Target

      8a0bca0b97c29250f21f4dadc11a4bfbc1a8b00df4765ae367b0526638bd3be2

    • Size

      409KB

    • MD5

      7417d9e889d5b1ea95cafed96ccd7afb

    • SHA1

      ea6456ba15fe7e39d2abac5fda0cd28621c2b1ba

    • SHA256

      8a0bca0b97c29250f21f4dadc11a4bfbc1a8b00df4765ae367b0526638bd3be2

    • SHA512

      03546ecc8079b72b0f01853e6ad841dfbe0d1d8b44178e0cfa879a54faebbcdfbd12aae1a30ecdaa303118a481527c6e1a4485edb3b3e2ea954e6beecab8cd09

    • SSDEEP

      6144:KNy+bnr+0p0yN90QEm/5yh+1b0KUZk0dCsiglMWfuQQ5J9BIYGqTL2OEoaLFcIAY:/MrIy902wh+l0Higlvud1b32OEo/Ir

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks