General

  • Target

    8e1b95ad40b1596925d4e29a6e8de483efc06d28fad4d80ba405f43a35c223c7

  • Size

    659KB

  • Sample

    230403-xwes8aad8z

  • MD5

    b97d684c7df45feb80a97bd9444cdb3d

  • SHA1

    1269dd603346afe19abd62148ee8873697c10566

  • SHA256

    8e1b95ad40b1596925d4e29a6e8de483efc06d28fad4d80ba405f43a35c223c7

  • SHA512

    d93fb4e7087b2e3790817bbc0e5ab95d2d1d35a38a226b901a8e129baae7ca9996fc465a1831c882831ff4c6b206f1746ca3f451d8f5f2f2a8c60390072c0234

  • SSDEEP

    12288:fMrky90FtFSEqtBjatDl0nUoRF1SKX/4dcZSF1Thyl6lhUINjEA:fymDStQtDPnF1ssvUUJ

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Targets

    • Target

      8e1b95ad40b1596925d4e29a6e8de483efc06d28fad4d80ba405f43a35c223c7

    • Size

      659KB

    • MD5

      b97d684c7df45feb80a97bd9444cdb3d

    • SHA1

      1269dd603346afe19abd62148ee8873697c10566

    • SHA256

      8e1b95ad40b1596925d4e29a6e8de483efc06d28fad4d80ba405f43a35c223c7

    • SHA512

      d93fb4e7087b2e3790817bbc0e5ab95d2d1d35a38a226b901a8e129baae7ca9996fc465a1831c882831ff4c6b206f1746ca3f451d8f5f2f2a8c60390072c0234

    • SSDEEP

      12288:fMrky90FtFSEqtBjatDl0nUoRF1SKX/4dcZSF1Thyl6lhUINjEA:fymDStQtDPnF1ssvUUJ

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks