General

  • Target

    812c86103c9e4bb29ffbb249cb8f057add2a08c1adc7d4050290c88b3307c28a

  • Size

    687KB

  • Sample

    230328-h3nblshe83

  • MD5

    a49ce846a74fce3f014bbf0ee3b32d81

  • SHA1

    f00e603f7d66e957d63987cb50024a8aa2a8f868

  • SHA256

    812c86103c9e4bb29ffbb249cb8f057add2a08c1adc7d4050290c88b3307c28a

  • SHA512

    13e7e92d9fe5f5cb7c3019f801120e7f935654a7b1bf99b2df546ebeee7f0105ec2d8a7db80d755e6fca90d15065a7294a80fd86cd20df9f7d4ef563a37dbc79

  • SSDEEP

    12288:EMrLy9059oa4lqp9H7FUk6yjCdUR5QiQvr8p5UqbuX8aepAKoQ:3yX09H7FljCG5Kr8PBuXLUoQ

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Targets

    • Target

      812c86103c9e4bb29ffbb249cb8f057add2a08c1adc7d4050290c88b3307c28a

    • Size

      687KB

    • MD5

      a49ce846a74fce3f014bbf0ee3b32d81

    • SHA1

      f00e603f7d66e957d63987cb50024a8aa2a8f868

    • SHA256

      812c86103c9e4bb29ffbb249cb8f057add2a08c1adc7d4050290c88b3307c28a

    • SHA512

      13e7e92d9fe5f5cb7c3019f801120e7f935654a7b1bf99b2df546ebeee7f0105ec2d8a7db80d755e6fca90d15065a7294a80fd86cd20df9f7d4ef563a37dbc79

    • SSDEEP

      12288:EMrLy9059oa4lqp9H7FUk6yjCdUR5QiQvr8p5UqbuX8aepAKoQ:3yX09H7FljCG5Kr8PBuXLUoQ

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks