General

  • Target

    ac6f78c77c1d1ffb78e51edd19f57487dd0b137feb5602449cf86696ef339048

  • Size

    684KB

  • Sample

    230328-jhqrnshf55

  • MD5

    836986cce54a048c8c29b41e2bc301a9

  • SHA1

    89185b727de852f77b123ec96530c2305a9a0559

  • SHA256

    ac6f78c77c1d1ffb78e51edd19f57487dd0b137feb5602449cf86696ef339048

  • SHA512

    72095638a87aba092482b849629784808baf5218391fbc93fa88879a14d24e3915d344a0a321ba47670a5a1f61c5da32957c3d694305f7d312fe49b1b2ae488e

  • SSDEEP

    12288:OMrGy90V+4Y9RQmtIV/yGX6yjCnqR59oM/UyVmvL3/P7dv:0yp3y6GRjCy59omrmvLt

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Targets

    • Target

      ac6f78c77c1d1ffb78e51edd19f57487dd0b137feb5602449cf86696ef339048

    • Size

      684KB

    • MD5

      836986cce54a048c8c29b41e2bc301a9

    • SHA1

      89185b727de852f77b123ec96530c2305a9a0559

    • SHA256

      ac6f78c77c1d1ffb78e51edd19f57487dd0b137feb5602449cf86696ef339048

    • SHA512

      72095638a87aba092482b849629784808baf5218391fbc93fa88879a14d24e3915d344a0a321ba47670a5a1f61c5da32957c3d694305f7d312fe49b1b2ae488e

    • SSDEEP

      12288:OMrGy90V+4Y9RQmtIV/yGX6yjCnqR59oM/UyVmvL3/P7dv:0yp3y6GRjCy59omrmvLt

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks