General

  • Target

    8191589b14796ff5e1d7cd55d94bc9b001b07ee1e136d422ebbc85d9744af35b

  • Size

    678KB

  • Sample

    230323-vvdteshb26

  • MD5

    2aaea4022ec6770f8a1a0dfade43c880

  • SHA1

    1f6f21b63c9513a41f04438fcd675cbb9c4db74d

  • SHA256

    8191589b14796ff5e1d7cd55d94bc9b001b07ee1e136d422ebbc85d9744af35b

  • SHA512

    97b7e45c2460f9241ae80805e648aadc20fb4490e0458c7a7b3b716fec047660b4366ccb6fd39609f8606acc0b4f5b298023488732ce27eeb3c3b52a5b60fe8a

  • SSDEEP

    12288:AH3E5EayeXnhhxQ4GOxy7NRL8imfK5CSPZNfOObDjtwxlAHTApQZ:wEELe/CQeNGDy5CSPffOOxwSTtZ

Malware Config

Extracted

Family

redline

Botnet

down

C2

193.233.20.31:4125

Attributes
  • auth_value

    12c31a90c72f5efae8c053a0bd339381

Extracted

Family

redline

Botnet

real

C2

193.233.20.31:4125

Attributes
  • auth_value

    bb22a50228754849387d5f4d1611e71b

Targets

    • Target

      8191589b14796ff5e1d7cd55d94bc9b001b07ee1e136d422ebbc85d9744af35b

    • Size

      678KB

    • MD5

      2aaea4022ec6770f8a1a0dfade43c880

    • SHA1

      1f6f21b63c9513a41f04438fcd675cbb9c4db74d

    • SHA256

      8191589b14796ff5e1d7cd55d94bc9b001b07ee1e136d422ebbc85d9744af35b

    • SHA512

      97b7e45c2460f9241ae80805e648aadc20fb4490e0458c7a7b3b716fec047660b4366ccb6fd39609f8606acc0b4f5b298023488732ce27eeb3c3b52a5b60fe8a

    • SSDEEP

      12288:AH3E5EayeXnhhxQ4GOxy7NRL8imfK5CSPZNfOObDjtwxlAHTApQZ:wEELe/CQeNGDy5CSPffOOxwSTtZ

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks