General

  • Target

    a6e8cee2057d55051c8dea9001ae9d3625e8bf4456709a2158a80e86a0c3415f

  • Size

    694KB

  • Sample

    230328-sp43babg35

  • MD5

    11458beebd7f384b76ea8e630c0e4f1a

  • SHA1

    111763ccb0c12299bea9ee2a55b3f1b0a21e8b54

  • SHA256

    a6e8cee2057d55051c8dea9001ae9d3625e8bf4456709a2158a80e86a0c3415f

  • SHA512

    c6c295aea0ff175d4304d2a06d99509ab8f3a8f8de2a1c34196ec629b83cca314d02df54f45310f5dab5099b9bf3684d4eec8e893bb170460c9fa69975d3a5c6

  • SSDEEP

    12288:LMrBy90V1/8KsxxApeeH5+oPP8jfE1aDzyOUpRuutZVqdnZDInUBVcTEPT:Kyw7sjApew5nHCfE1O+YurQn5gacTEr

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

muse

C2

176.113.115.145:4125

Attributes
  • auth_value

    b91988a63a24940038d9262827a5320c

Targets

    • Target

      a6e8cee2057d55051c8dea9001ae9d3625e8bf4456709a2158a80e86a0c3415f

    • Size

      694KB

    • MD5

      11458beebd7f384b76ea8e630c0e4f1a

    • SHA1

      111763ccb0c12299bea9ee2a55b3f1b0a21e8b54

    • SHA256

      a6e8cee2057d55051c8dea9001ae9d3625e8bf4456709a2158a80e86a0c3415f

    • SHA512

      c6c295aea0ff175d4304d2a06d99509ab8f3a8f8de2a1c34196ec629b83cca314d02df54f45310f5dab5099b9bf3684d4eec8e893bb170460c9fa69975d3a5c6

    • SSDEEP

      12288:LMrBy90V1/8KsxxApeeH5+oPP8jfE1aDzyOUpRuutZVqdnZDInUBVcTEPT:Kyw7sjApew5nHCfE1O+YurQn5gacTEr

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks