General

  • Target

    d0c0895b9fbfdf93a5316fe4dcb56d34b1297e1691ef4d85e435ed1d36f3bc85

  • Size

    678KB

  • Sample

    230323-vxpzgahb46

  • MD5

    2cb6451baa1eed642ae7806a23b8265c

  • SHA1

    ea38772c6de1de292f3fcd54ea858d7f49194efb

  • SHA256

    d0c0895b9fbfdf93a5316fe4dcb56d34b1297e1691ef4d85e435ed1d36f3bc85

  • SHA512

    a9915627e9500279921cbcb60406b921cfe5bfc7aae49e68bea8ebb9ffeea45027fdc5819a85405fe23ba9ea3874bee92611ecdb85793a1fb4db613d090f7dd8

  • SSDEEP

    12288:TH3E5EayeXnhhxQ4GOxy7NRL8imfK5CSPZNfOObDjtwxlAHTApQZ:zEELe/CQeNGDy5CSPffOOxwSTtZ

Malware Config

Extracted

Family

redline

Botnet

down

C2

193.233.20.31:4125

Attributes
  • auth_value

    12c31a90c72f5efae8c053a0bd339381

Extracted

Family

redline

Botnet

real

C2

193.233.20.31:4125

Attributes
  • auth_value

    bb22a50228754849387d5f4d1611e71b

Targets

    • Target

      d0c0895b9fbfdf93a5316fe4dcb56d34b1297e1691ef4d85e435ed1d36f3bc85

    • Size

      678KB

    • MD5

      2cb6451baa1eed642ae7806a23b8265c

    • SHA1

      ea38772c6de1de292f3fcd54ea858d7f49194efb

    • SHA256

      d0c0895b9fbfdf93a5316fe4dcb56d34b1297e1691ef4d85e435ed1d36f3bc85

    • SHA512

      a9915627e9500279921cbcb60406b921cfe5bfc7aae49e68bea8ebb9ffeea45027fdc5819a85405fe23ba9ea3874bee92611ecdb85793a1fb4db613d090f7dd8

    • SSDEEP

      12288:TH3E5EayeXnhhxQ4GOxy7NRL8imfK5CSPZNfOObDjtwxlAHTApQZ:zEELe/CQeNGDy5CSPffOOxwSTtZ

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks