General

  • Target

    5cfce9d96d50530d066a441d447423cf75ceb43d41f9bf2c2ca1a7ae0d0e98f8

  • Size

    700KB

  • Sample

    230327-3kmmkshg3z

  • MD5

    c8737d4d6b65d292b244a8b6bc5f57a5

  • SHA1

    3812badf8205f93e666985b4c6c6d59867bf56be

  • SHA256

    5cfce9d96d50530d066a441d447423cf75ceb43d41f9bf2c2ca1a7ae0d0e98f8

  • SHA512

    3f716f256b6ba5d1670a7fac524023f5fbb82c62c9f8c11577c1b1fa06e2ab7099a04632de3031b921d9a3c38bbea04c191c30cc6adfbd01df937b2e92c6200a

  • SSDEEP

    12288:EMrsy90tye21nPNH/o9D5RcAHOQ8Fg40HZrsz4XBRpcG+c+9pR:4yqye21FH/MHOQ8W405vXB5F+nR

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Targets

    • Target

      5cfce9d96d50530d066a441d447423cf75ceb43d41f9bf2c2ca1a7ae0d0e98f8

    • Size

      700KB

    • MD5

      c8737d4d6b65d292b244a8b6bc5f57a5

    • SHA1

      3812badf8205f93e666985b4c6c6d59867bf56be

    • SHA256

      5cfce9d96d50530d066a441d447423cf75ceb43d41f9bf2c2ca1a7ae0d0e98f8

    • SHA512

      3f716f256b6ba5d1670a7fac524023f5fbb82c62c9f8c11577c1b1fa06e2ab7099a04632de3031b921d9a3c38bbea04c191c30cc6adfbd01df937b2e92c6200a

    • SSDEEP

      12288:EMrsy90tye21nPNH/o9D5RcAHOQ8Fg40HZrsz4XBRpcG+c+9pR:4yqye21FH/MHOQ8W405vXB5F+nR

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks