General

  • Target

    c097803972e942c112586daada62f5a685eed10fdab4f77aca274a3e78a1583f

  • Size

    540KB

  • Sample

    230324-n8q8caeb68

  • MD5

    4360af6f8a2ccaf3131cbc49a339b464

  • SHA1

    c973dbc179a99270ad9a3ae2a19c84b805ff1706

  • SHA256

    c097803972e942c112586daada62f5a685eed10fdab4f77aca274a3e78a1583f

  • SHA512

    31d680fdc06be4313a3e3420bcc4e7307071aa7d7f12232e128d30a09e1072c8688b6d20e236af67c4a63ced11a937f270f61902cf5bf1882f5049ed9b7edb6b

  • SSDEEP

    12288:QMr+y90pskdwkPwBwNJlOs9UtQyCaArmdwSGi7:+yivPwBwduQUVj

Malware Config

Extracted

Family

redline

Botnet

down

C2

193.233.20.31:4125

Attributes
  • auth_value

    12c31a90c72f5efae8c053a0bd339381

Extracted

Family

redline

Botnet

hero

C2

193.233.20.31:4125

Attributes
  • auth_value

    11f3c75a88ca461bcc8d6bf60a1193e3

Targets

    • Target

      c097803972e942c112586daada62f5a685eed10fdab4f77aca274a3e78a1583f

    • Size

      540KB

    • MD5

      4360af6f8a2ccaf3131cbc49a339b464

    • SHA1

      c973dbc179a99270ad9a3ae2a19c84b805ff1706

    • SHA256

      c097803972e942c112586daada62f5a685eed10fdab4f77aca274a3e78a1583f

    • SHA512

      31d680fdc06be4313a3e3420bcc4e7307071aa7d7f12232e128d30a09e1072c8688b6d20e236af67c4a63ced11a937f270f61902cf5bf1882f5049ed9b7edb6b

    • SSDEEP

      12288:QMr+y90pskdwkPwBwNJlOs9UtQyCaArmdwSGi7:+yivPwBwduQUVj

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks