General

  • Target

    b835e741e913e247fc776cfcb36c4e6a926254a9644523d2d38cf65613d27230

  • Size

    686KB

  • Sample

    230325-wpp5yadh23

  • MD5

    515203d9f0680cbcb2b7800effa8b961

  • SHA1

    5f8d85580b7406a73402002288985e1f1a0f80d0

  • SHA256

    b835e741e913e247fc776cfcb36c4e6a926254a9644523d2d38cf65613d27230

  • SHA512

    1df8569b42e4f50af43f7ef499b2320b289c986982b15d5ba7e56452cdc292447a4fcef895dec6ca388165c245dee3d3916c306b402b14ccd01ebbda7f6cb2e8

  • SSDEEP

    12288:SMr+y902geV4FUj5CEMNdadgd2qkKy8Db2zDpbs5vZXSku:YyjgeGFFNdad62rHeb2fpGhm

Malware Config

Extracted

Family

redline

Botnet

boris

C2

193.233.20.32:4125

Attributes
  • auth_value

    766b5bdf6dbefcf7ca223351952fc38f

Targets

    • Target

      b835e741e913e247fc776cfcb36c4e6a926254a9644523d2d38cf65613d27230

    • Size

      686KB

    • MD5

      515203d9f0680cbcb2b7800effa8b961

    • SHA1

      5f8d85580b7406a73402002288985e1f1a0f80d0

    • SHA256

      b835e741e913e247fc776cfcb36c4e6a926254a9644523d2d38cf65613d27230

    • SHA512

      1df8569b42e4f50af43f7ef499b2320b289c986982b15d5ba7e56452cdc292447a4fcef895dec6ca388165c245dee3d3916c306b402b14ccd01ebbda7f6cb2e8

    • SSDEEP

      12288:SMr+y902geV4FUj5CEMNdadgd2qkKy8Db2zDpbs5vZXSku:YyjgeGFFNdad62rHeb2fpGhm

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks