General

  • Target

    9af7f41c2f6a932a72a632f3e32a9b7fb4d3f334afa399a2cb405a9d4ca711cc

  • Size

    810KB

  • Sample

    230412-etkycabc6w

  • MD5

    9e98817885fcf385eea0cd8d5e05d7bb

  • SHA1

    e20c27eceb3c49ac3474bad75184d69628dcde8f

  • SHA256

    9af7f41c2f6a932a72a632f3e32a9b7fb4d3f334afa399a2cb405a9d4ca711cc

  • SHA512

    e8f4dd2b53bb3a437bfe178d7fac1c9daa9786e47f5688f9acbdab96f8ab1d1b18b965def10d46d8178ee790bb02c0e44bf084a573aab1c9e2d811776d64ae5f

  • SSDEEP

    12288:7Mrcy90wOr4sVQII0dPpKENZKT4eHNQdIWZyAXZcgsY+F6x04e:7y4ks5IuscZKnNwV1rshFwe

Malware Config

Extracted

Family

redline

Botnet

lada

C2

185.161.248.90:4125

Attributes
  • auth_value

    0b3678897547fedafe314eda5a2015ba

Extracted

Family

redline

Botnet

diza

C2

185.161.248.90:4125

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Targets

    • Target

      9af7f41c2f6a932a72a632f3e32a9b7fb4d3f334afa399a2cb405a9d4ca711cc

    • Size

      810KB

    • MD5

      9e98817885fcf385eea0cd8d5e05d7bb

    • SHA1

      e20c27eceb3c49ac3474bad75184d69628dcde8f

    • SHA256

      9af7f41c2f6a932a72a632f3e32a9b7fb4d3f334afa399a2cb405a9d4ca711cc

    • SHA512

      e8f4dd2b53bb3a437bfe178d7fac1c9daa9786e47f5688f9acbdab96f8ab1d1b18b965def10d46d8178ee790bb02c0e44bf084a573aab1c9e2d811776d64ae5f

    • SSDEEP

      12288:7Mrcy90wOr4sVQII0dPpKENZKT4eHNQdIWZyAXZcgsY+F6x04e:7y4ks5IuscZKnNwV1rshFwe

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks