General

  • Target

    3bd89e60a1a36273d445c09e145092656ba57453e708e3cf58da2912aa5ede2d

  • Size

    641KB

  • Sample

    230314-v95kpaag6t

  • MD5

    429caf52f1f36fc296186b19636bf2ce

  • SHA1

    3474cb763ced62bcbe826dd59d6430b60c0f906f

  • SHA256

    3bd89e60a1a36273d445c09e145092656ba57453e708e3cf58da2912aa5ede2d

  • SHA512

    e807369c219ae8323dac16a6c486af1978f1d28ad3e8f3c35584142ec344e5447c8f0f856212a64676e9c272ffdf55a7ef1e20f0b5ebfc92a6097593e2446e77

  • SSDEEP

    12288:OMrNy90L6j5pgtZEpe4qX3iC0K1adPKaPYHA:byT5KtZEk4Gr7paAHA

Malware Config

Extracted

Family

redline

Botnet

mango

C2

193.233.20.28:4125

Attributes
  • auth_value

    ecf79d7f5227d998a3501c972d915d23

Targets

    • Target

      3bd89e60a1a36273d445c09e145092656ba57453e708e3cf58da2912aa5ede2d

    • Size

      641KB

    • MD5

      429caf52f1f36fc296186b19636bf2ce

    • SHA1

      3474cb763ced62bcbe826dd59d6430b60c0f906f

    • SHA256

      3bd89e60a1a36273d445c09e145092656ba57453e708e3cf58da2912aa5ede2d

    • SHA512

      e807369c219ae8323dac16a6c486af1978f1d28ad3e8f3c35584142ec344e5447c8f0f856212a64676e9c272ffdf55a7ef1e20f0b5ebfc92a6097593e2446e77

    • SSDEEP

      12288:OMrNy90L6j5pgtZEpe4qX3iC0K1adPKaPYHA:byT5KtZEk4Gr7paAHA

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks