General

  • Target

    121f150b73aeaf7f2e0da2dadbcc30da5893fb0a00427f208af862c21155abd5

  • Size

    682KB

  • Sample

    230328-jjeqsshf57

  • MD5

    565bd7f600da882212dee93b68512c9d

  • SHA1

    da45f3b132f50b20981f720558aad49e14194f1e

  • SHA256

    121f150b73aeaf7f2e0da2dadbcc30da5893fb0a00427f208af862c21155abd5

  • SHA512

    aba2c87876fef0ff83a69cea3bc3c559f9a5a80f32f428965ff634d82ea04dffce52b669d6e932cee0efffe0ef7464ff597fe61b462feb8b8dedb729601bb04e

  • SSDEEP

    12288:cMrAy90pJsPeKxv9ohjzxTbrxO39xv/n7WMwCUUxZmhL3DY5P6/o:0yCJsPeKB9ohBTbrKtj+CU8mhLzY9F

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Targets

    • Target

      121f150b73aeaf7f2e0da2dadbcc30da5893fb0a00427f208af862c21155abd5

    • Size

      682KB

    • MD5

      565bd7f600da882212dee93b68512c9d

    • SHA1

      da45f3b132f50b20981f720558aad49e14194f1e

    • SHA256

      121f150b73aeaf7f2e0da2dadbcc30da5893fb0a00427f208af862c21155abd5

    • SHA512

      aba2c87876fef0ff83a69cea3bc3c559f9a5a80f32f428965ff634d82ea04dffce52b669d6e932cee0efffe0ef7464ff597fe61b462feb8b8dedb729601bb04e

    • SSDEEP

      12288:cMrAy90pJsPeKxv9ohjzxTbrxO39xv/n7WMwCUUxZmhL3DY5P6/o:0yCJsPeKB9ohBTbrKtj+CU8mhLzY9F

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks