General

  • Target

    1f93e625d92147eef6c5d238a934952fa3c70c02616d31a5fd1447d72536dc8c

  • Size

    546KB

  • Sample

    230324-bqvrladd2t

  • MD5

    5875907000c0e51f1dcc403980cd9f0d

  • SHA1

    e26602a7a252d227ad4d93a6f10f0a1960088dc1

  • SHA256

    1f93e625d92147eef6c5d238a934952fa3c70c02616d31a5fd1447d72536dc8c

  • SHA512

    0e4ea4b4978927e9511d99972b714974d3c92d1e18a10fa29460065ecc5209acc5e4753eb2ba19ce600efba047abe28747f58a80543d7cb125a085d0d002496f

  • SSDEEP

    12288:UMrCy90wT11IhbBrPf26TeNiKDgnB1tbwL93pOHcLt:2yPzYT26OOvC93pRLt

Malware Config

Extracted

Family

redline

Botnet

down

C2

193.233.20.31:4125

Attributes
  • auth_value

    12c31a90c72f5efae8c053a0bd339381

Extracted

Family

redline

Botnet

real

C2

193.233.20.31:4125

Attributes
  • auth_value

    bb22a50228754849387d5f4d1611e71b

Targets

    • Target

      1f93e625d92147eef6c5d238a934952fa3c70c02616d31a5fd1447d72536dc8c

    • Size

      546KB

    • MD5

      5875907000c0e51f1dcc403980cd9f0d

    • SHA1

      e26602a7a252d227ad4d93a6f10f0a1960088dc1

    • SHA256

      1f93e625d92147eef6c5d238a934952fa3c70c02616d31a5fd1447d72536dc8c

    • SHA512

      0e4ea4b4978927e9511d99972b714974d3c92d1e18a10fa29460065ecc5209acc5e4753eb2ba19ce600efba047abe28747f58a80543d7cb125a085d0d002496f

    • SSDEEP

      12288:UMrCy90wT11IhbBrPf26TeNiKDgnB1tbwL93pOHcLt:2yPzYT26OOvC93pRLt

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks