General

  • Target

    5620bf554079ece4d5d8f19611ec326def1c201954b1949578492efe02857396

  • Size

    659KB

  • Sample

    230403-1vptksfb93

  • MD5

    adc8984cb67384e670732b784519ae1d

  • SHA1

    abd1af2e7f92706d685e16528ce19a294602451b

  • SHA256

    5620bf554079ece4d5d8f19611ec326def1c201954b1949578492efe02857396

  • SHA512

    e4f43c989426180ef132588269362ad6a1d21291fc9e9ae8f4c75a7eb1d888518a949dcd635384963261b77f24210280afcfd67d3858c2cd9d1ae97c0f483d26

  • SSDEEP

    12288:0MrGy90MaQtstFrQ8MuF5w88Z2k/xAi0pkitg1Ng2t59nrwbk1CVaOft/juDKZcF:yyU8p8IqeNg2t5h4k8VHBoKZcF

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Targets

    • Target

      5620bf554079ece4d5d8f19611ec326def1c201954b1949578492efe02857396

    • Size

      659KB

    • MD5

      adc8984cb67384e670732b784519ae1d

    • SHA1

      abd1af2e7f92706d685e16528ce19a294602451b

    • SHA256

      5620bf554079ece4d5d8f19611ec326def1c201954b1949578492efe02857396

    • SHA512

      e4f43c989426180ef132588269362ad6a1d21291fc9e9ae8f4c75a7eb1d888518a949dcd635384963261b77f24210280afcfd67d3858c2cd9d1ae97c0f483d26

    • SSDEEP

      12288:0MrGy90MaQtstFrQ8MuF5w88Z2k/xAi0pkitg1Ng2t59nrwbk1CVaOft/juDKZcF:yyU8p8IqeNg2t5h4k8VHBoKZcF

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks