General

  • Target

    51782375769ee7827ae1ab5a14dd9c03f55ee86a835d3fc778b19a4046480aa0

  • Size

    1.5MB

  • Sample

    230504-mbeydadd51

  • MD5

    02f2a17d81a97c1fdea0975934ba1369

  • SHA1

    31dc67e98a48eb0fbea106ca5183f0bc0701a7a6

  • SHA256

    51782375769ee7827ae1ab5a14dd9c03f55ee86a835d3fc778b19a4046480aa0

  • SHA512

    091eab54961e3c138d089bdf6729ec8ca7a7f11cb1c9d369ea3b962c5f8045c60fb917cb0c5925a8fe5973cc7a9bf4a4c603926baff0fc5b4b7020c0b5ec3e2b

  • SSDEEP

    49152:NvaHmUEWPY27qtvS+QDi/f+8THj7mD7q:dJUEWx7qtvSZWLnmD7q

Malware Config

Extracted

Family

redline

Botnet

boom

C2

217.196.96.56:4138

Attributes
  • auth_value

    1ce6aebe15bac07a7bc88b114bc49335

Targets

    • Target

      51782375769ee7827ae1ab5a14dd9c03f55ee86a835d3fc778b19a4046480aa0

    • Size

      1.5MB

    • MD5

      02f2a17d81a97c1fdea0975934ba1369

    • SHA1

      31dc67e98a48eb0fbea106ca5183f0bc0701a7a6

    • SHA256

      51782375769ee7827ae1ab5a14dd9c03f55ee86a835d3fc778b19a4046480aa0

    • SHA512

      091eab54961e3c138d089bdf6729ec8ca7a7f11cb1c9d369ea3b962c5f8045c60fb917cb0c5925a8fe5973cc7a9bf4a4c603926baff0fc5b4b7020c0b5ec3e2b

    • SSDEEP

      49152:NvaHmUEWPY27qtvS+QDi/f+8THj7mD7q:dJUEWx7qtvSZWLnmD7q

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks