General

  • Target

    9510249f7df68dbfa1beabd0d6896ee526ebd89b973acb7fe06476f382ad3554

  • Size

    544KB

  • Sample

    230323-y62w6sbh7w

  • MD5

    a874eef5e573bd04bccdfc29f7593b7f

  • SHA1

    5e8ae406c07f7c4b24c6e1e35e9145315d69f880

  • SHA256

    9510249f7df68dbfa1beabd0d6896ee526ebd89b973acb7fe06476f382ad3554

  • SHA512

    b653702d7b50e3ab6f7d151ae8ab9f0cb4e48a10e153c8e8798503e79e0262ac142bdc7d547819f8fbfc80cf522f0b251d6f03d318045a2e5e9841d5c5cb6c20

  • SSDEEP

    12288:5Mr2y90pqesDg+/Epi5lfN0O5JhqgU3MLPwtkUVR5C2GGrmEr:nyKyganvaMDiR5CBBQ

Malware Config

Extracted

Family

redline

Botnet

down

C2

193.233.20.31:4125

Attributes
  • auth_value

    12c31a90c72f5efae8c053a0bd339381

Extracted

Family

redline

Botnet

real

C2

193.233.20.31:4125

Attributes
  • auth_value

    bb22a50228754849387d5f4d1611e71b

Targets

    • Target

      9510249f7df68dbfa1beabd0d6896ee526ebd89b973acb7fe06476f382ad3554

    • Size

      544KB

    • MD5

      a874eef5e573bd04bccdfc29f7593b7f

    • SHA1

      5e8ae406c07f7c4b24c6e1e35e9145315d69f880

    • SHA256

      9510249f7df68dbfa1beabd0d6896ee526ebd89b973acb7fe06476f382ad3554

    • SHA512

      b653702d7b50e3ab6f7d151ae8ab9f0cb4e48a10e153c8e8798503e79e0262ac142bdc7d547819f8fbfc80cf522f0b251d6f03d318045a2e5e9841d5c5cb6c20

    • SSDEEP

      12288:5Mr2y90pqesDg+/Epi5lfN0O5JhqgU3MLPwtkUVR5C2GGrmEr:nyKyganvaMDiR5CBBQ

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks