General

  • Target

    0d88bb7e2c87029c60f7dc4ff9c96b9e.bin

  • Size

    642KB

  • Sample

    230328-bggtdaaa4w

  • MD5

    14b43eb29c8be8b1f63af5472380610e

  • SHA1

    ce8f8aea4a9322e64128cf8a739dce7b28d29419

  • SHA256

    fd021c9d1ce155b147898f9d8d9b2add1c93b6b1179621e0ec99db9daa7b9819

  • SHA512

    a40c932df031a50d1c83dc586e032db9e3f4a3ec7621233c10643ac5291ffe0a0e9cf4b1402e405b9a84b4fc662977e8d5e29c0e2dab31a212c83a83a5fc3720

  • SSDEEP

    12288:vODYXG+OxOJoVyGvGdaqcpMPhQatpTWRPRSqdUyZ/nxGxBJaE1mls16BFMvFHIaP:20XiWBcp2ZLWBR7U8xGnJ/edFM9HIazT

Malware Config

Extracted

Family

redline

Botnet

boris

C2

193.233.20.32:4125

Attributes
  • auth_value

    766b5bdf6dbefcf7ca223351952fc38f

Extracted

Family

redline

Botnet

dogma

C2

193.233.20.32:4125

Attributes
  • auth_value

    1b692976ca991040f2e8890409c35142

Targets

    • Target

      ea704ebfe9b88d2ea1422f338d33b9c88594fea59a289354dfb04141e173d047.exe

    • Size

      686KB

    • MD5

      0d88bb7e2c87029c60f7dc4ff9c96b9e

    • SHA1

      7414b47b0831b73f297e4cf7692f1bb7abf1ebfc

    • SHA256

      ea704ebfe9b88d2ea1422f338d33b9c88594fea59a289354dfb04141e173d047

    • SHA512

      239559e6bff3a55405372333a589f6d09f1cc5f9f16214880170d7cf312c2ada2ef68e70b5e4f4425ceb87d2064849a41c0799e02543784146c8dbe3e2d0173a

    • SSDEEP

      12288:IMrfy90j872tpvCck7igA3bwcEDG6rz4F28PeVB:XyQ88vCcj3eH

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks