General

  • Target

    255a26bcf2d831e73cc232b7c7a2b22fb89d83c5e560392fc3f42cc7a16a5e16

  • Size

    660KB

  • Sample

    230403-wq337aab3w

  • MD5

    7e40504243c4de24cdc60aa136d80e8e

  • SHA1

    7ce052f4f6e143816eca5b408a7a96c8c9f182e2

  • SHA256

    255a26bcf2d831e73cc232b7c7a2b22fb89d83c5e560392fc3f42cc7a16a5e16

  • SHA512

    e13274b6f9662d7c12f396ad1e183a31085b76f748145957a95c167068e247f83067beb6d8ccc6cefb7601223b4aa35c0c2417abd787f97fdf4069cd2fc72b0a

  • SSDEEP

    12288:XMrcy90XeWOGZDFDwlQbZzQCUVkGEbhRbuSZST0M1Tl6oVGXfB:TyphGvdU6GENRylT08soVGXp

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Targets

    • Target

      255a26bcf2d831e73cc232b7c7a2b22fb89d83c5e560392fc3f42cc7a16a5e16

    • Size

      660KB

    • MD5

      7e40504243c4de24cdc60aa136d80e8e

    • SHA1

      7ce052f4f6e143816eca5b408a7a96c8c9f182e2

    • SHA256

      255a26bcf2d831e73cc232b7c7a2b22fb89d83c5e560392fc3f42cc7a16a5e16

    • SHA512

      e13274b6f9662d7c12f396ad1e183a31085b76f748145957a95c167068e247f83067beb6d8ccc6cefb7601223b4aa35c0c2417abd787f97fdf4069cd2fc72b0a

    • SSDEEP

      12288:XMrcy90XeWOGZDFDwlQbZzQCUVkGEbhRbuSZST0M1Tl6oVGXfB:TyphGvdU6GENRylT08soVGXp

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks