General

  • Target

    75fc7d5c17968ea2fd74ff0665b791426b2e03012b3eb6b3633d978ea9584824

  • Size

    690KB

  • Sample

    230328-bvk3ysab3x

  • MD5

    1f60fdfb0fb57c6d818a775fd0b8d1fa

  • SHA1

    60452deea9381fcc1da40c51dea095e1e4ccb041

  • SHA256

    75fc7d5c17968ea2fd74ff0665b791426b2e03012b3eb6b3633d978ea9584824

  • SHA512

    e2d473e9e91a138abf75400beaa1cbe2a09eaf6d713d52c963a9386c1b132e044462ab3d8e24fde643f3bc01af22de8861721a04282192e2eb1d8196a78e0b0b

  • SSDEEP

    12288:ZMrpy90JtSeGs06LMKRyx65hLuybvjMSKE3BIgfsXNTAptvAF0sfigvw4/fhL+zK:UyVEMcfayTjLt3BHfyNytI0sagvVqm

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Targets

    • Target

      75fc7d5c17968ea2fd74ff0665b791426b2e03012b3eb6b3633d978ea9584824

    • Size

      690KB

    • MD5

      1f60fdfb0fb57c6d818a775fd0b8d1fa

    • SHA1

      60452deea9381fcc1da40c51dea095e1e4ccb041

    • SHA256

      75fc7d5c17968ea2fd74ff0665b791426b2e03012b3eb6b3633d978ea9584824

    • SHA512

      e2d473e9e91a138abf75400beaa1cbe2a09eaf6d713d52c963a9386c1b132e044462ab3d8e24fde643f3bc01af22de8861721a04282192e2eb1d8196a78e0b0b

    • SSDEEP

      12288:ZMrpy90JtSeGs06LMKRyx65hLuybvjMSKE3BIgfsXNTAptvAF0sfigvw4/fhL+zK:UyVEMcfayTjLt3BHfyNytI0sagvVqm

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks