General

  • Target

    9a4de5508379fd1a3879217b02bff52b64c556a08d86a54979340a0ae3ed731e

  • Size

    544KB

  • Sample

    230323-zd5b9saa56

  • MD5

    bd05df9bbce1d69c9605755ddf7af88b

  • SHA1

    855746685a67cf1198136f175adaf7d1385cc62e

  • SHA256

    9a4de5508379fd1a3879217b02bff52b64c556a08d86a54979340a0ae3ed731e

  • SHA512

    2934f265f953af8b8235afa8e915a009bc37c57c997ee58bb07e7be532fba16b669a4d53312f22af80c26d213c75dc5c1fa3987e628ad40e799918124a5aa452

  • SSDEEP

    12288:DMrIy90bfj36Qkdo65Mryt8j/GcEqgUHMLqwhK+pPHK:fyg76NG6S+G/ACMe6pPq

Malware Config

Extracted

Family

redline

Botnet

down

C2

193.233.20.31:4125

Attributes
  • auth_value

    12c31a90c72f5efae8c053a0bd339381

Extracted

Family

redline

Botnet

real

C2

193.233.20.31:4125

Attributes
  • auth_value

    bb22a50228754849387d5f4d1611e71b

Targets

    • Target

      9a4de5508379fd1a3879217b02bff52b64c556a08d86a54979340a0ae3ed731e

    • Size

      544KB

    • MD5

      bd05df9bbce1d69c9605755ddf7af88b

    • SHA1

      855746685a67cf1198136f175adaf7d1385cc62e

    • SHA256

      9a4de5508379fd1a3879217b02bff52b64c556a08d86a54979340a0ae3ed731e

    • SHA512

      2934f265f953af8b8235afa8e915a009bc37c57c997ee58bb07e7be532fba16b669a4d53312f22af80c26d213c75dc5c1fa3987e628ad40e799918124a5aa452

    • SSDEEP

      12288:DMrIy90bfj36Qkdo65Mryt8j/GcEqgUHMLqwhK+pPHK:fyg76NG6S+G/ACMe6pPq

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.