General

  • Target

    6e0a1c75b28d827108a15679b9da9d588960bfbd9394083b874e19c2520cd6b2

  • Size

    726KB

  • Sample

    230325-ezhp6sbb43

  • MD5

    07256b46994ecd7c4bc096da13062580

  • SHA1

    7cc9e9cb3644644da706a1e36b5c3fe10a221d10

  • SHA256

    6e0a1c75b28d827108a15679b9da9d588960bfbd9394083b874e19c2520cd6b2

  • SHA512

    1bc9620b72d32ccd2d77095de0fdb6c01518387fa07a6425abe06300e86d0dab6c648589daf7bbeae8ad6bd20332817f3fbb5318bc68c91d8c4743a7f117cd7f

  • SSDEEP

    12288:5p3JDQAu5fdU6AdozuoTnsSu07dIIaYwKFd9iGWOCKjEWf8XgtpsDUdIQEm7ZxS:5p5u1G6AWK/C7dnap89b98Xmm/m72

Malware Config

Extracted

Family

redline

Botnet

boris

C2

193.233.20.32:4125

Attributes
  • auth_value

    766b5bdf6dbefcf7ca223351952fc38f

Extracted

Family

redline

Botnet

firmu

C2

193.233.20.32:4125

Attributes
  • auth_value

    9f3e5e35e4a3a38fc36c5a851728aa33

Targets

    • Target

      6e0a1c75b28d827108a15679b9da9d588960bfbd9394083b874e19c2520cd6b2

    • Size

      726KB

    • MD5

      07256b46994ecd7c4bc096da13062580

    • SHA1

      7cc9e9cb3644644da706a1e36b5c3fe10a221d10

    • SHA256

      6e0a1c75b28d827108a15679b9da9d588960bfbd9394083b874e19c2520cd6b2

    • SHA512

      1bc9620b72d32ccd2d77095de0fdb6c01518387fa07a6425abe06300e86d0dab6c648589daf7bbeae8ad6bd20332817f3fbb5318bc68c91d8c4743a7f117cd7f

    • SSDEEP

      12288:5p3JDQAu5fdU6AdozuoTnsSu07dIIaYwKFd9iGWOCKjEWf8XgtpsDUdIQEm7ZxS:5p5u1G6AWK/C7dnap89b98Xmm/m72

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks