General

  • Target

    5ace8cba16c7be61c49d5cfa8063a0291e529eba5dd00d8d9b94891b2ebc965c

  • Size

    836KB

  • Sample

    230319-pl1zpsad3s

  • MD5

    de1c0df499a0bcddb6c3e982e8be33c6

  • SHA1

    5bb5a00009f726115a9fd71602d6fe40f088ed9c

  • SHA256

    5ace8cba16c7be61c49d5cfa8063a0291e529eba5dd00d8d9b94891b2ebc965c

  • SHA512

    59321b04eb40b57b61ee9f400db542aef4dcce7fcc583f8fd63bcee1490fe98cc969336a55532261fd586dadd514cf60f07920c6c981b5c0d236492a9c7d8590

  • SSDEEP

    12288:1Mrmy90xJYxVjfF6AgFS/90+Ud4+yHxUVp4hQIrKborYB4gXZqUaRheSbdVqH:3ypBSFS/k4t46rKbBZZqUaaSaH

Malware Config

Extracted

Family

redline

Botnet

gena

C2

193.233.20.30:4125

Attributes
  • auth_value

    93c20961cb6b06b2d5781c212db6201e

Extracted

Family

redline

Botnet

ruka

C2

193.233.20.28:4125

Attributes
  • auth_value

    5d1d0e51ebe1e3f16cca573ff651c43c

Targets

    • Target

      5ace8cba16c7be61c49d5cfa8063a0291e529eba5dd00d8d9b94891b2ebc965c

    • Size

      836KB

    • MD5

      de1c0df499a0bcddb6c3e982e8be33c6

    • SHA1

      5bb5a00009f726115a9fd71602d6fe40f088ed9c

    • SHA256

      5ace8cba16c7be61c49d5cfa8063a0291e529eba5dd00d8d9b94891b2ebc965c

    • SHA512

      59321b04eb40b57b61ee9f400db542aef4dcce7fcc583f8fd63bcee1490fe98cc969336a55532261fd586dadd514cf60f07920c6c981b5c0d236492a9c7d8590

    • SSDEEP

      12288:1Mrmy90xJYxVjfF6AgFS/90+Ud4+yHxUVp4hQIrKborYB4gXZqUaRheSbdVqH:3ypBSFS/k4t46rKbBZZqUaaSaH

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks