General

  • Target

    1526551bde89ed0058379e54c9bddcd777e1d7d553de84b7cfd8e17290d51fa9

  • Size

    641KB

  • Sample

    230314-v6zv2agg94

  • MD5

    0fa36cf649c41f3620880db5e9d1cc12

  • SHA1

    3dae0886625519c59e5d064b83a4fcdbd92f8e82

  • SHA256

    1526551bde89ed0058379e54c9bddcd777e1d7d553de84b7cfd8e17290d51fa9

  • SHA512

    0e38422d211cadb899e7f0983d202f3ff68d8ff2f67f2a714a9e380f8ee44210a2da2b132c9960404216d0e5080013757dae0e11a820028d9e2a2489e0409a8e

  • SSDEEP

    12288:gMr8y90pr0VsyuSbTm06E/0+lPZ0K1u9wUo:syKYVs8C06itZ7N

Malware Config

Extracted

Family

redline

Botnet

mango

C2

193.233.20.28:4125

Attributes
  • auth_value

    ecf79d7f5227d998a3501c972d915d23

Targets

    • Target

      1526551bde89ed0058379e54c9bddcd777e1d7d553de84b7cfd8e17290d51fa9

    • Size

      641KB

    • MD5

      0fa36cf649c41f3620880db5e9d1cc12

    • SHA1

      3dae0886625519c59e5d064b83a4fcdbd92f8e82

    • SHA256

      1526551bde89ed0058379e54c9bddcd777e1d7d553de84b7cfd8e17290d51fa9

    • SHA512

      0e38422d211cadb899e7f0983d202f3ff68d8ff2f67f2a714a9e380f8ee44210a2da2b132c9960404216d0e5080013757dae0e11a820028d9e2a2489e0409a8e

    • SSDEEP

      12288:gMr8y90pr0VsyuSbTm06E/0+lPZ0K1u9wUo:syKYVs8C06itZ7N

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks