General

  • Target

    780c4d8f2029d51b77c79631fc0ff6c6be434bdc163eb2a2c52f94c19c21083c

  • Size

    689KB

  • Sample

    230328-bbxbwaaa2x

  • MD5

    453d61e006c308f8a86e28fbfd85fb4b

  • SHA1

    9c8649469f8e7bdcad6a153dbb6df60e1c5005e0

  • SHA256

    780c4d8f2029d51b77c79631fc0ff6c6be434bdc163eb2a2c52f94c19c21083c

  • SHA512

    9d5d2efddf0243c9730f36d6ff636d641c403103feede67332ae40f04ccc89660499ba845263364b957d2ec4a10680bc2022aa48309b79cbb56bc286f43cea4e

  • SSDEEP

    12288:JMrAy90T1kTL3Q/mqsZlwJ3KYm1RNgpQCe6NSLiZYoiO+WQCr1wu:Jyh3Q/1sDwJIRNQQ4SfOfQC5F

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      780c4d8f2029d51b77c79631fc0ff6c6be434bdc163eb2a2c52f94c19c21083c

    • Size

      689KB

    • MD5

      453d61e006c308f8a86e28fbfd85fb4b

    • SHA1

      9c8649469f8e7bdcad6a153dbb6df60e1c5005e0

    • SHA256

      780c4d8f2029d51b77c79631fc0ff6c6be434bdc163eb2a2c52f94c19c21083c

    • SHA512

      9d5d2efddf0243c9730f36d6ff636d641c403103feede67332ae40f04ccc89660499ba845263364b957d2ec4a10680bc2022aa48309b79cbb56bc286f43cea4e

    • SSDEEP

      12288:JMrAy90T1kTL3Q/mqsZlwJ3KYm1RNgpQCe6NSLiZYoiO+WQCr1wu:Jyh3Q/1sDwJIRNQQ4SfOfQC5F

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks