General

  • Target

    046fb96b55a1bb3bf92a1f6052619487987e1d9ad6d129fb5dd18d3f4a147b4f

  • Size

    678KB

  • Sample

    230323-wgwyhsbc2v

  • MD5

    6259fb26e3a236f947da34837a8c2cc5

  • SHA1

    91301225f66d799b31b0958294851297c1f46036

  • SHA256

    046fb96b55a1bb3bf92a1f6052619487987e1d9ad6d129fb5dd18d3f4a147b4f

  • SHA512

    8af61eae6cf1022568cf481c2a3733b19f44ac5a7415a104d2064b3f32be2aac831e2059ef6e2732ce11122de0847505db3346474703fa1d4f30efc68120166d

  • SSDEEP

    12288:FH3E5EayeXnhhxQ4GOxy7NRL8imfK5CSPZNfOObDjtwxlAHTApQZ:ZEELe/CQeNGDy5CSPffOOxwSTtZ

Malware Config

Extracted

Family

redline

Botnet

down

C2

193.233.20.31:4125

Attributes
  • auth_value

    12c31a90c72f5efae8c053a0bd339381

Extracted

Family

redline

Botnet

real

C2

193.233.20.31:4125

Attributes
  • auth_value

    bb22a50228754849387d5f4d1611e71b

Targets

    • Target

      046fb96b55a1bb3bf92a1f6052619487987e1d9ad6d129fb5dd18d3f4a147b4f

    • Size

      678KB

    • MD5

      6259fb26e3a236f947da34837a8c2cc5

    • SHA1

      91301225f66d799b31b0958294851297c1f46036

    • SHA256

      046fb96b55a1bb3bf92a1f6052619487987e1d9ad6d129fb5dd18d3f4a147b4f

    • SHA512

      8af61eae6cf1022568cf481c2a3733b19f44ac5a7415a104d2064b3f32be2aac831e2059ef6e2732ce11122de0847505db3346474703fa1d4f30efc68120166d

    • SSDEEP

      12288:FH3E5EayeXnhhxQ4GOxy7NRL8imfK5CSPZNfOObDjtwxlAHTApQZ:ZEELe/CQeNGDy5CSPffOOxwSTtZ

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks