General

  • Target

    993c3acf5ee675bc5242f9d91f6774b6be155f8bcd7f9ad06d1f0cb90bcf3f7c

  • Size

    699KB

  • Sample

    230327-wwxtcsgg4t

  • MD5

    df75224ce8c94d6563b58dec1cacef86

  • SHA1

    724a711058eaa0cc113598d0ea1ddc9b4fc9b696

  • SHA256

    993c3acf5ee675bc5242f9d91f6774b6be155f8bcd7f9ad06d1f0cb90bcf3f7c

  • SHA512

    94123418742d09f516bfd4d698ab195585495d7f3ef8906026343badbe2e6f4594e35a0c96c303ea28c6ff661009d3c5f45f8fd633a0ae6c470988e35fc47d22

  • SSDEEP

    12288:5MrYy90llsV3oW/LyP21LmdIv3G5jOQMb2iG8vZrM8NwPIzLL9rFtATrO7F:JyZ3/LU29j3G5jOXb2iGyrM8NAIfL9Zd

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Targets

    • Target

      993c3acf5ee675bc5242f9d91f6774b6be155f8bcd7f9ad06d1f0cb90bcf3f7c

    • Size

      699KB

    • MD5

      df75224ce8c94d6563b58dec1cacef86

    • SHA1

      724a711058eaa0cc113598d0ea1ddc9b4fc9b696

    • SHA256

      993c3acf5ee675bc5242f9d91f6774b6be155f8bcd7f9ad06d1f0cb90bcf3f7c

    • SHA512

      94123418742d09f516bfd4d698ab195585495d7f3ef8906026343badbe2e6f4594e35a0c96c303ea28c6ff661009d3c5f45f8fd633a0ae6c470988e35fc47d22

    • SSDEEP

      12288:5MrYy90llsV3oW/LyP21LmdIv3G5jOQMb2iG8vZrM8NwPIzLL9rFtATrO7F:JyZ3/LU29j3G5jOXb2iGyrM8NAIfL9Zd

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks