General

  • Target

    5bf2e938e27582a28fad924e428a20176e32c1bc953cbac0a8ae78ccf94d8d81

  • Size

    726KB

  • Sample

    230325-e7lf2abb68

  • MD5

    4b774fd1ba56a2bc86317eae445510aa

  • SHA1

    0d7eee35861e9cec489a7d2c0b43bdafff15a4ff

  • SHA256

    5bf2e938e27582a28fad924e428a20176e32c1bc953cbac0a8ae78ccf94d8d81

  • SHA512

    f6db0643998838b6835e8e629e11e522afbc4cb132f2d8be15d5b6185729abc8cdeb3e36bc5a5e91f17032de54dd68cc9b58400f87e85fdcf288051dda47ac12

  • SSDEEP

    12288:4p3JDQAu5fdU6AdozuoTnsSu07dIIaYwKFd9iGWOCKjEWf8XgtpsDUdIQEm7ZxS:4p5u1G6AWK/C7dnap89b98Xmm/m72

Malware Config

Extracted

Family

redline

Botnet

boris

C2

193.233.20.32:4125

Attributes
  • auth_value

    766b5bdf6dbefcf7ca223351952fc38f

Extracted

Family

redline

Botnet

firmu

C2

193.233.20.32:4125

Attributes
  • auth_value

    9f3e5e35e4a3a38fc36c5a851728aa33

Targets

    • Target

      5bf2e938e27582a28fad924e428a20176e32c1bc953cbac0a8ae78ccf94d8d81

    • Size

      726KB

    • MD5

      4b774fd1ba56a2bc86317eae445510aa

    • SHA1

      0d7eee35861e9cec489a7d2c0b43bdafff15a4ff

    • SHA256

      5bf2e938e27582a28fad924e428a20176e32c1bc953cbac0a8ae78ccf94d8d81

    • SHA512

      f6db0643998838b6835e8e629e11e522afbc4cb132f2d8be15d5b6185729abc8cdeb3e36bc5a5e91f17032de54dd68cc9b58400f87e85fdcf288051dda47ac12

    • SSDEEP

      12288:4p3JDQAu5fdU6AdozuoTnsSu07dIIaYwKFd9iGWOCKjEWf8XgtpsDUdIQEm7ZxS:4p5u1G6AWK/C7dnap89b98Xmm/m72

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks