General

  • Target

    4dd670c0796a8c6033d2d5ee51742f1c3592de0fe05be426200e9ffbacd0f5d9

  • Size

    696KB

  • Sample

    230328-3dbxhafe6w

  • MD5

    719ae4bf8cbc0da421627c7a3d9659d3

  • SHA1

    4e0835f744c54c6893ec78702242325968dfda68

  • SHA256

    4dd670c0796a8c6033d2d5ee51742f1c3592de0fe05be426200e9ffbacd0f5d9

  • SHA512

    c6f64ebabdeec70e63fa6936b22a72b18f6671c7c0e20844af4bf41217b426ddd08d49810647fd9541dda77d892f408aabbcff66361e6ffa53c9d7fe02505e00

  • SSDEEP

    12288:GMrJy90pzBvTT40iDD3NLih3NBB9ES3qEXql69/QR9RynCwqWek2822z/yRY3NP:/yET23NLs9BB9QEXql6oRys8Lry+

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

zaza

C2

176.113.115.145:4125

Attributes
  • auth_value

    48bf44c663fe3c1035fb4dd0b91fde5d

Targets

    • Target

      4dd670c0796a8c6033d2d5ee51742f1c3592de0fe05be426200e9ffbacd0f5d9

    • Size

      696KB

    • MD5

      719ae4bf8cbc0da421627c7a3d9659d3

    • SHA1

      4e0835f744c54c6893ec78702242325968dfda68

    • SHA256

      4dd670c0796a8c6033d2d5ee51742f1c3592de0fe05be426200e9ffbacd0f5d9

    • SHA512

      c6f64ebabdeec70e63fa6936b22a72b18f6671c7c0e20844af4bf41217b426ddd08d49810647fd9541dda77d892f408aabbcff66361e6ffa53c9d7fe02505e00

    • SSDEEP

      12288:GMrJy90pzBvTT40iDD3NLih3NBB9ES3qEXql69/QR9RynCwqWek2822z/yRY3NP:/yET23NLs9BB9QEXql6oRys8Lry+

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks