General

  • Target

    832c7b4977951dd48f323b03b8761712dbc9a1dc0d67b85508c6ebb24a5c7815

  • Size

    690KB

  • Sample

    230328-a83z9ahh9z

  • MD5

    8aa1d94b74a86eaa809756ca4d3863be

  • SHA1

    2b6ee59b8ce62ec6147d84a4de3cc22ca9255f31

  • SHA256

    832c7b4977951dd48f323b03b8761712dbc9a1dc0d67b85508c6ebb24a5c7815

  • SHA512

    438c21694b576f9f7cee59d9610ee71394db5843af7b699627ccb392cf751d517ac28ac631b1099fd424337c8ed29b44a6f523b3c2696a2fca8deffcc704e3c1

  • SSDEEP

    12288:TMrgy90stdF3CpFVA054Lk5Oqdq3KYmnFxp837RkLpRsq8e+81CNB:XyfXQA05r5Dqizp837Rk8q8eb1QB

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      832c7b4977951dd48f323b03b8761712dbc9a1dc0d67b85508c6ebb24a5c7815

    • Size

      690KB

    • MD5

      8aa1d94b74a86eaa809756ca4d3863be

    • SHA1

      2b6ee59b8ce62ec6147d84a4de3cc22ca9255f31

    • SHA256

      832c7b4977951dd48f323b03b8761712dbc9a1dc0d67b85508c6ebb24a5c7815

    • SHA512

      438c21694b576f9f7cee59d9610ee71394db5843af7b699627ccb392cf751d517ac28ac631b1099fd424337c8ed29b44a6f523b3c2696a2fca8deffcc704e3c1

    • SSDEEP

      12288:TMrgy90stdF3CpFVA054Lk5Oqdq3KYmnFxp837RkLpRsq8e+81CNB:XyfXQA05r5Dqizp837Rk8q8eb1QB

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks