General

  • Target

    f53790e4c161a96e2a7f58d3144b82987bdc0ddfd963e4977ab4b20614900ade

  • Size

    679KB

  • Sample

    230323-1bjhfsac47

  • MD5

    089959f8366e4bc15d3c47b951276821

  • SHA1

    b02dc216c902ecb4e401c4554063d17bedd49f05

  • SHA256

    f53790e4c161a96e2a7f58d3144b82987bdc0ddfd963e4977ab4b20614900ade

  • SHA512

    0c22d57f95590acce47cbd06100fa466dacbb3bb3560f9cb959ca1ce09ff1e2565f15a4b78836671cc7e220da2bdf18db185eb4c09dc234ab889f64c61385bcf

  • SSDEEP

    12288:oGHIGD4gZKt4U5Mu3iTTKJ2e32cc8M1o/SldCnGoxkqeYBndoehW8ArY+v4://HeDoTKwC2r8mldwGWkCoevSY+A

Malware Config

Extracted

Family

redline

Botnet

down

C2

193.233.20.31:4125

Attributes
  • auth_value

    12c31a90c72f5efae8c053a0bd339381

Extracted

Family

redline

Botnet

real

C2

193.233.20.31:4125

Attributes
  • auth_value

    bb22a50228754849387d5f4d1611e71b

Targets

    • Target

      f53790e4c161a96e2a7f58d3144b82987bdc0ddfd963e4977ab4b20614900ade

    • Size

      679KB

    • MD5

      089959f8366e4bc15d3c47b951276821

    • SHA1

      b02dc216c902ecb4e401c4554063d17bedd49f05

    • SHA256

      f53790e4c161a96e2a7f58d3144b82987bdc0ddfd963e4977ab4b20614900ade

    • SHA512

      0c22d57f95590acce47cbd06100fa466dacbb3bb3560f9cb959ca1ce09ff1e2565f15a4b78836671cc7e220da2bdf18db185eb4c09dc234ab889f64c61385bcf

    • SSDEEP

      12288:oGHIGD4gZKt4U5Mu3iTTKJ2e32cc8M1o/SldCnGoxkqeYBndoehW8ArY+v4://HeDoTKwC2r8mldwGWkCoevSY+A

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks