General

  • Target

    a1be3d9d431c87007f5dc1c85c4e5b7a4e120b47c713f247141288d339ceda14

  • Size

    647KB

  • Sample

    230314-qd1jmsfd89

  • MD5

    dc1b6573f61f4b651295d3c1798653fe

  • SHA1

    3abe398ff451e78005a42b44d7c9fdec4bf13f48

  • SHA256

    a1be3d9d431c87007f5dc1c85c4e5b7a4e120b47c713f247141288d339ceda14

  • SHA512

    2a3fa09d78ba63c258ba57f3797265c020d289961b97e69b2e79bcb8e32a87843b2fa7eed405ebe305a6df402e516a0d056927a3a782e4ce9cdee3840e3f6a2f

  • SSDEEP

    12288:PMrCy90IHH5U4IzjSv/FcaElACOIFzSdZORETiIOGwqdgTAO:1yXS4Go2e9IFmqRhG1yAO

Malware Config

Extracted

Family

redline

Botnet

mango

C2

193.233.20.28:4125

Attributes
  • auth_value

    ecf79d7f5227d998a3501c972d915d23

Targets

    • Target

      a1be3d9d431c87007f5dc1c85c4e5b7a4e120b47c713f247141288d339ceda14

    • Size

      647KB

    • MD5

      dc1b6573f61f4b651295d3c1798653fe

    • SHA1

      3abe398ff451e78005a42b44d7c9fdec4bf13f48

    • SHA256

      a1be3d9d431c87007f5dc1c85c4e5b7a4e120b47c713f247141288d339ceda14

    • SHA512

      2a3fa09d78ba63c258ba57f3797265c020d289961b97e69b2e79bcb8e32a87843b2fa7eed405ebe305a6df402e516a0d056927a3a782e4ce9cdee3840e3f6a2f

    • SSDEEP

      12288:PMrCy90IHH5U4IzjSv/FcaElACOIFzSdZORETiIOGwqdgTAO:1yXS4Go2e9IFmqRhG1yAO

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks