General

  • Target

    7f80787d38486459a9c104bc8c42dd78c68e0e27411be54897379c415c7c73fd

  • Size

    690KB

  • Sample

    230328-a5w3jahh8w

  • MD5

    0c87128b0af187a9fe71653d1a0e5263

  • SHA1

    001166bb1806c1063c1c1cea0ef6098514871057

  • SHA256

    7f80787d38486459a9c104bc8c42dd78c68e0e27411be54897379c415c7c73fd

  • SHA512

    e276d4155b9d5d0a68c5474f756eef46abf49adeb78ef13f3d70c5c7da785f000c7c55044641e2c6f09a7b2af2f96d60d4f9c0889de4143af59f92779e8696ba

  • SSDEEP

    12288:XMrUy90DLtlNOkp0zgKrIv1HTh3K43YALqOoTgBetsh0T7YU1+iiWW1kfd:ryQNeg2oph0AmOoEBeGhVyEM

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      7f80787d38486459a9c104bc8c42dd78c68e0e27411be54897379c415c7c73fd

    • Size

      690KB

    • MD5

      0c87128b0af187a9fe71653d1a0e5263

    • SHA1

      001166bb1806c1063c1c1cea0ef6098514871057

    • SHA256

      7f80787d38486459a9c104bc8c42dd78c68e0e27411be54897379c415c7c73fd

    • SHA512

      e276d4155b9d5d0a68c5474f756eef46abf49adeb78ef13f3d70c5c7da785f000c7c55044641e2c6f09a7b2af2f96d60d4f9c0889de4143af59f92779e8696ba

    • SSDEEP

      12288:XMrUy90DLtlNOkp0zgKrIv1HTh3K43YALqOoTgBetsh0T7YU1+iiWW1kfd:ryQNeg2oph0AmOoEBeGhVyEM

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks