General

  • Target

    788f286a0c8686a02cd65c2a97631e0ea3e37023029666cf6e97f3882cc9959c

  • Size

    659KB

  • Sample

    230403-2kclyadc9s

  • MD5

    743ccf9bf95989514cef22c8c7df5be7

  • SHA1

    78e2af932792781937b22822e8d8ce0aa981ca92

  • SHA256

    788f286a0c8686a02cd65c2a97631e0ea3e37023029666cf6e97f3882cc9959c

  • SHA512

    7bfd9caceb374110ebb35aa940ae464276de83547029adcf825f85b0886329fa1bf202dfb70389642e3620c36de6b5b2b5a937f8459dd425de68dce762bd37d2

  • SSDEEP

    12288:lMrRy90GyD7KI4H7tb2IIWOLSVMCt592rwB6eCZanft/juHTFl:UyMGI45Dp4kt5YW6vZyB+H

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Targets

    • Target

      788f286a0c8686a02cd65c2a97631e0ea3e37023029666cf6e97f3882cc9959c

    • Size

      659KB

    • MD5

      743ccf9bf95989514cef22c8c7df5be7

    • SHA1

      78e2af932792781937b22822e8d8ce0aa981ca92

    • SHA256

      788f286a0c8686a02cd65c2a97631e0ea3e37023029666cf6e97f3882cc9959c

    • SHA512

      7bfd9caceb374110ebb35aa940ae464276de83547029adcf825f85b0886329fa1bf202dfb70389642e3620c36de6b5b2b5a937f8459dd425de68dce762bd37d2

    • SSDEEP

      12288:lMrRy90GyD7KI4H7tb2IIWOLSVMCt592rwB6eCZanft/juHTFl:UyMGI45Dp4kt5YW6vZyB+H

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks