General

  • Target

    3a4f16273b6c3c0de4efb1fd21575a58c7bba5e244298433a77918b63689f882

  • Size

    836KB

  • Sample

    230319-z865caab78

  • MD5

    8ea107ce3343cfc56b8d6f63bf959906

  • SHA1

    f6b802a350a5b994c4ebfd7bcf95896bf89c3c5d

  • SHA256

    3a4f16273b6c3c0de4efb1fd21575a58c7bba5e244298433a77918b63689f882

  • SHA512

    ddc4363243c7998929b2be664c68a50fd1dd1e0f3507ef1735d4d834a6cc6535075e9b71e1bed7844834af7a18880cc744af19481a048047504ee3a3f2a940cd

  • SSDEEP

    12288:iMrBy90hjOKdkzAWgu5gZ2iUuGqw0LY8Jk8q5SaVimN35xKfUVc+RixhmX6qaj:byyjxOAu6ZlUFyk8SzLB33KfTMixQAj

Malware Config

Extracted

Family

redline

Botnet

gena

C2

193.233.20.30:4125

Attributes
  • auth_value

    93c20961cb6b06b2d5781c212db6201e

Extracted

Family

redline

Botnet

relon

C2

193.233.20.30:4125

Attributes
  • auth_value

    17da69809725577b595e217ba006b869

Targets

    • Target

      3a4f16273b6c3c0de4efb1fd21575a58c7bba5e244298433a77918b63689f882

    • Size

      836KB

    • MD5

      8ea107ce3343cfc56b8d6f63bf959906

    • SHA1

      f6b802a350a5b994c4ebfd7bcf95896bf89c3c5d

    • SHA256

      3a4f16273b6c3c0de4efb1fd21575a58c7bba5e244298433a77918b63689f882

    • SHA512

      ddc4363243c7998929b2be664c68a50fd1dd1e0f3507ef1735d4d834a6cc6535075e9b71e1bed7844834af7a18880cc744af19481a048047504ee3a3f2a940cd

    • SSDEEP

      12288:iMrBy90hjOKdkzAWgu5gZ2iUuGqw0LY8Jk8q5SaVimN35xKfUVc+RixhmX6qaj:byyjxOAu6ZlUFyk8SzLB33KfTMixQAj

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks