General

  • Target

    4700331e8a9cc0b72e5f247fadc958b5d05db10ccc69e1942bf1889a1459cdfd

  • Size

    700KB

  • Sample

    230328-ahmkksga25

  • MD5

    89af4f67653f2867d4f1bcf216f2a0f4

  • SHA1

    ea4940b6ad10a85fe6159b8d20917a22c5a89a6b

  • SHA256

    4700331e8a9cc0b72e5f247fadc958b5d05db10ccc69e1942bf1889a1459cdfd

  • SHA512

    3ddadc3ea634dbb463e1e79632aea5af1051aac249765a83189aa625a994451e0fca4d57c58be519ea15f9d2dc2fda60530bd88cc74201af6a73a21661c0f13e

  • SSDEEP

    12288:nMrJy90rEqaG+FfFmmI09kc+1VpFQHm/5ovNMj5X4rWs5FNj7xvg1IvM4DKZG7:OyEnV+xAnnBZ5XoFNHxY1IvM4DKZs

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Targets

    • Target

      4700331e8a9cc0b72e5f247fadc958b5d05db10ccc69e1942bf1889a1459cdfd

    • Size

      700KB

    • MD5

      89af4f67653f2867d4f1bcf216f2a0f4

    • SHA1

      ea4940b6ad10a85fe6159b8d20917a22c5a89a6b

    • SHA256

      4700331e8a9cc0b72e5f247fadc958b5d05db10ccc69e1942bf1889a1459cdfd

    • SHA512

      3ddadc3ea634dbb463e1e79632aea5af1051aac249765a83189aa625a994451e0fca4d57c58be519ea15f9d2dc2fda60530bd88cc74201af6a73a21661c0f13e

    • SSDEEP

      12288:nMrJy90rEqaG+FfFmmI09kc+1VpFQHm/5ovNMj5X4rWs5FNj7xvg1IvM4DKZG7:OyEnV+xAnnBZ5XoFNHxY1IvM4DKZs

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks