General

  • Target

    2396e8c936776e4eac4686b266c0315d3a091363d60e467155910ed0c218df8e

  • Size

    678KB

  • Sample

    230323-vywhmshb54

  • MD5

    c83af4742daf88e5d455b3af6ec1f7be

  • SHA1

    9c19ac112021816c71c7f640a5329f294e9f065c

  • SHA256

    2396e8c936776e4eac4686b266c0315d3a091363d60e467155910ed0c218df8e

  • SHA512

    ea22c7109781b042d888d92a4fcedbdb389faaaa28c16200cd4639127f415683dca6f3900225f3a8f1b310cb35e35988cc12ad10953424abee99ad5341f5a469

  • SSDEEP

    12288:AH3E5EayeXnhhxQ4GOxy7NRL8imfK5CSPZNfOObDjtwxlAHTApQZ:wEELe/CQeNGDy5CSPffOOxwSTtZ

Malware Config

Extracted

Family

redline

Botnet

down

C2

193.233.20.31:4125

Attributes
  • auth_value

    12c31a90c72f5efae8c053a0bd339381

Extracted

Family

redline

Botnet

real

C2

193.233.20.31:4125

Attributes
  • auth_value

    bb22a50228754849387d5f4d1611e71b

Targets

    • Target

      2396e8c936776e4eac4686b266c0315d3a091363d60e467155910ed0c218df8e

    • Size

      678KB

    • MD5

      c83af4742daf88e5d455b3af6ec1f7be

    • SHA1

      9c19ac112021816c71c7f640a5329f294e9f065c

    • SHA256

      2396e8c936776e4eac4686b266c0315d3a091363d60e467155910ed0c218df8e

    • SHA512

      ea22c7109781b042d888d92a4fcedbdb389faaaa28c16200cd4639127f415683dca6f3900225f3a8f1b310cb35e35988cc12ad10953424abee99ad5341f5a469

    • SSDEEP

      12288:AH3E5EayeXnhhxQ4GOxy7NRL8imfK5CSPZNfOObDjtwxlAHTApQZ:wEELe/CQeNGDy5CSPffOOxwSTtZ

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks