General

  • Target

    546b8ceb769c1706ec14f0717163450166d8d268972014add44ddc6f9d341ded

  • Size

    787KB

  • Sample

    230316-jmxe1shg62

  • MD5

    fb5bc7febdfdfd91c438f80a34655878

  • SHA1

    1327c9b29c84a6ee1c4bb62406d4d96722229ce8

  • SHA256

    546b8ceb769c1706ec14f0717163450166d8d268972014add44ddc6f9d341ded

  • SHA512

    ab8744e0d93bfd898bf9485d3d3e02d814cc3497562724e196e0e9e7b9e4bb140c65c7d423b56bb27839f23e3d2f91f37e8bfb996ddbafa927d7e872dcc4a06d

  • SSDEEP

    12288:OMrJy904IeZyLm0QvqbTFV7QEg+r2VI6gZGC4BFn5V2y9haeRCRKcC2KV:/yrwX15nLsI6govHnBseARKb

Malware Config

Extracted

Family

redline

Botnet

mango

C2

193.233.20.28:4125

Attributes
  • auth_value

    ecf79d7f5227d998a3501c972d915d23

Extracted

Family

redline

Botnet

sito

C2

193.233.20.28:4125

Attributes
  • auth_value

    030f94d8e396dbe51ce339b815cdad17

Targets

    • Target

      546b8ceb769c1706ec14f0717163450166d8d268972014add44ddc6f9d341ded

    • Size

      787KB

    • MD5

      fb5bc7febdfdfd91c438f80a34655878

    • SHA1

      1327c9b29c84a6ee1c4bb62406d4d96722229ce8

    • SHA256

      546b8ceb769c1706ec14f0717163450166d8d268972014add44ddc6f9d341ded

    • SHA512

      ab8744e0d93bfd898bf9485d3d3e02d814cc3497562724e196e0e9e7b9e4bb140c65c7d423b56bb27839f23e3d2f91f37e8bfb996ddbafa927d7e872dcc4a06d

    • SSDEEP

      12288:OMrJy904IeZyLm0QvqbTFV7QEg+r2VI6gZGC4BFn5V2y9haeRCRKcC2KV:/yrwX15nLsI6govHnBseARKb

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks