General

  • Target

    6de2b370e3a4aca7692181f315011550bd9562d310b3a0ea37a41ad139263238

  • Size

    540KB

  • Sample

    230324-t22cmafe67

  • MD5

    2cf6d7baaf67aff0005cd2f9bcb72138

  • SHA1

    6f6485d349dd2cdd83c1e01d4a0ddcd4c99123da

  • SHA256

    6de2b370e3a4aca7692181f315011550bd9562d310b3a0ea37a41ad139263238

  • SHA512

    c6f945504961e486a9290ac399eddafcaf39dc85897d46f3c5900a8234ea9894b3835cd9fc811d1e5b496e3486bea2ad8f8ec3a0e47d87f1f32ddb6ba0fd350f

  • SSDEEP

    6144:Kcy+bnr+Np0yN90QEvPVPHQrFrQppJgxhBKEJLBjhvvlvtFMFQDKAszjdLsf9t/B:4MrRy90dPVPHgN9KwHhJD6zjijWdA

Malware Config

Extracted

Family

redline

Botnet

boris

C2

193.233.20.32:4125

Attributes
  • auth_value

    766b5bdf6dbefcf7ca223351952fc38f

Extracted

Family

redline

Botnet

lida

C2

193.233.20.32:4125

Attributes
  • auth_value

    24052aa2e9b85984a98d80cf08623e8d

Targets

    • Target

      6de2b370e3a4aca7692181f315011550bd9562d310b3a0ea37a41ad139263238

    • Size

      540KB

    • MD5

      2cf6d7baaf67aff0005cd2f9bcb72138

    • SHA1

      6f6485d349dd2cdd83c1e01d4a0ddcd4c99123da

    • SHA256

      6de2b370e3a4aca7692181f315011550bd9562d310b3a0ea37a41ad139263238

    • SHA512

      c6f945504961e486a9290ac399eddafcaf39dc85897d46f3c5900a8234ea9894b3835cd9fc811d1e5b496e3486bea2ad8f8ec3a0e47d87f1f32ddb6ba0fd350f

    • SSDEEP

      6144:Kcy+bnr+Np0yN90QEvPVPHQrFrQppJgxhBKEJLBjhvvlvtFMFQDKAszjdLsf9t/B:4MrRy90dPVPHgN9KwHhJD6zjijWdA

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks