General

  • Target

    716914713348a942b22a429f6842653a9c303ffb6c3c30ef330e42c2f87ca04d

  • Size

    691KB

  • Sample

    230328-a4scysgb22

  • MD5

    e9f2e758de0cce9935ae20eb1a12d3ac

  • SHA1

    2df61413256fd159c930263881a2b356f4c5bec5

  • SHA256

    716914713348a942b22a429f6842653a9c303ffb6c3c30ef330e42c2f87ca04d

  • SHA512

    7e91472d915be5697649a11daa94675f9d909339ea9dd257a549584ac51ca3d1ba8bb0689e0e972df265c95946ca819c87e275c9630284eb1b3d73ae9913e34f

  • SSDEEP

    12288:ZMrAy90wu6GaZHqe+QsRSi46XQ7kl7zf8oPNyVKmRb/3I+lBJQ0R77EKZk:Vy9u7gq1NXp1yV5R/hBa2gsk

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      716914713348a942b22a429f6842653a9c303ffb6c3c30ef330e42c2f87ca04d

    • Size

      691KB

    • MD5

      e9f2e758de0cce9935ae20eb1a12d3ac

    • SHA1

      2df61413256fd159c930263881a2b356f4c5bec5

    • SHA256

      716914713348a942b22a429f6842653a9c303ffb6c3c30ef330e42c2f87ca04d

    • SHA512

      7e91472d915be5697649a11daa94675f9d909339ea9dd257a549584ac51ca3d1ba8bb0689e0e972df265c95946ca819c87e275c9630284eb1b3d73ae9913e34f

    • SSDEEP

      12288:ZMrAy90wu6GaZHqe+QsRSi46XQ7kl7zf8oPNyVKmRb/3I+lBJQ0R77EKZk:Vy9u7gq1NXp1yV5R/hBa2gsk

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks