General

  • Target

    74305eb91f075917d15cb2c4012c13671084dbc3b219793237610187c7cf3a6f

  • Size

    1.5MB

  • Sample

    230503-ygbnpaab3t

  • MD5

    eaaff1f4165e46841cdb2e73c174a1a8

  • SHA1

    3bc2a094ecad4f420b8734547c9350cc3ae715c4

  • SHA256

    74305eb91f075917d15cb2c4012c13671084dbc3b219793237610187c7cf3a6f

  • SHA512

    3ce1a3cb7c02ac1e4db654d62958c6390728bda1d4d3fc1d3e16b81407cede728d37a8bdbbd0341d586ee84e00695904f91947d7664eea98f4ff6c5c473789ef

  • SSDEEP

    24576:jmySyLmq7/St1Gk4rdBK+Ttvyf7wpG72VXRflp3kfZ+HgInHUSaX:Btiq7/g1j4rdzTt6f+CihflJalyRa

Malware Config

Extracted

Family

redline

Botnet

mask

C2

217.196.96.56:4138

Attributes
  • auth_value

    31aef25be0febb8e491794ef7f502c50

Targets

    • Target

      74305eb91f075917d15cb2c4012c13671084dbc3b219793237610187c7cf3a6f

    • Size

      1.5MB

    • MD5

      eaaff1f4165e46841cdb2e73c174a1a8

    • SHA1

      3bc2a094ecad4f420b8734547c9350cc3ae715c4

    • SHA256

      74305eb91f075917d15cb2c4012c13671084dbc3b219793237610187c7cf3a6f

    • SHA512

      3ce1a3cb7c02ac1e4db654d62958c6390728bda1d4d3fc1d3e16b81407cede728d37a8bdbbd0341d586ee84e00695904f91947d7664eea98f4ff6c5c473789ef

    • SSDEEP

      24576:jmySyLmq7/St1Gk4rdBK+Ttvyf7wpG72VXRflp3kfZ+HgInHUSaX:Btiq7/g1j4rdzTt6f+CihflJalyRa

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks