General

  • Target

    3ffe6eb1ae5effc89af02aa6b9fecb3e790bcfc34f674975aa1e06af7026a443

  • Size

    680KB

  • Sample

    230324-m49nfsdg89

  • MD5

    aa928de7b248d50c45b7bd71b648f03d

  • SHA1

    61e80d9b7568275bfb4e926ec70c88227793aa96

  • SHA256

    3ffe6eb1ae5effc89af02aa6b9fecb3e790bcfc34f674975aa1e06af7026a443

  • SHA512

    165cc5512e593d1fa6d71041c00b2b07ae2b53d107c75688651dbe625ea636e3c2a20f8e09e998883b47a89baa59ff311f6a58bedbbde984617b59ee69d82fe5

  • SSDEEP

    12288:FliBqa8L9z+9mDZ7wFwkEhZlR/zRbOXjTOpngeV6mxJDoh2rU0sRH:gqh96gDZ7VXhz4XHEngeV6mA5l

Malware Config

Extracted

Family

redline

Botnet

down

C2

193.233.20.31:4125

Attributes
  • auth_value

    12c31a90c72f5efae8c053a0bd339381

Extracted

Family

redline

Botnet

hero

C2

193.233.20.31:4125

Attributes
  • auth_value

    11f3c75a88ca461bcc8d6bf60a1193e3

Targets

    • Target

      3ffe6eb1ae5effc89af02aa6b9fecb3e790bcfc34f674975aa1e06af7026a443

    • Size

      680KB

    • MD5

      aa928de7b248d50c45b7bd71b648f03d

    • SHA1

      61e80d9b7568275bfb4e926ec70c88227793aa96

    • SHA256

      3ffe6eb1ae5effc89af02aa6b9fecb3e790bcfc34f674975aa1e06af7026a443

    • SHA512

      165cc5512e593d1fa6d71041c00b2b07ae2b53d107c75688651dbe625ea636e3c2a20f8e09e998883b47a89baa59ff311f6a58bedbbde984617b59ee69d82fe5

    • SSDEEP

      12288:FliBqa8L9z+9mDZ7wFwkEhZlR/zRbOXjTOpngeV6mxJDoh2rU0sRH:gqh96gDZ7VXhz4XHEngeV6mA5l

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks