General

  • Target

    f64f80f5753b571eb36c2c14777f6cf5763a19cf1c3f3ccf85f0a704425a58f6

  • Size

    1.5MB

  • Sample

    230504-j4t18acg9s

  • MD5

    f7e55a5b0a37d073d989ea0f880f3e80

  • SHA1

    53c1a5476ed9b7570d43e5e56543c0cc4b314d0a

  • SHA256

    f64f80f5753b571eb36c2c14777f6cf5763a19cf1c3f3ccf85f0a704425a58f6

  • SHA512

    8425f830073d1066933eca96c1f715414e120c4a44962ec96320b55b3a78bd4502e157a7452b9d3fab27bba560839223de294a7f3c03741558109f65d28d33e9

  • SSDEEP

    24576:yyXhS/vzUccIZejQnWE1QlZhN/Ot37atzSTMT5P6EiXNP41USGR1Z:ZxmzUZOejQnIBN/OtmoTMTp2dPENg

Malware Config

Extracted

Family

redline

Botnet

mazda

C2

217.196.96.56:4138

Attributes
  • auth_value

    3d2870537d84a4c6d7aeecd002871c51

Targets

    • Target

      f64f80f5753b571eb36c2c14777f6cf5763a19cf1c3f3ccf85f0a704425a58f6

    • Size

      1.5MB

    • MD5

      f7e55a5b0a37d073d989ea0f880f3e80

    • SHA1

      53c1a5476ed9b7570d43e5e56543c0cc4b314d0a

    • SHA256

      f64f80f5753b571eb36c2c14777f6cf5763a19cf1c3f3ccf85f0a704425a58f6

    • SHA512

      8425f830073d1066933eca96c1f715414e120c4a44962ec96320b55b3a78bd4502e157a7452b9d3fab27bba560839223de294a7f3c03741558109f65d28d33e9

    • SSDEEP

      24576:yyXhS/vzUccIZejQnWE1QlZhN/Ot37atzSTMT5P6EiXNP41USGR1Z:ZxmzUZOejQnIBN/OtmoTMTp2dPENg

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks