General

  • Target

    4779ee29664b150899abe4e84816939d25dea81dca306c21679eb9ae5fcf286e

  • Size

    479KB

  • Sample

    230506-tccmzahg88

  • MD5

    ddb5b513f83eb70611071203a695403c

  • SHA1

    3cd5bc9241ad3ab2965d4b98ac562336a7fed0eb

  • SHA256

    4779ee29664b150899abe4e84816939d25dea81dca306c21679eb9ae5fcf286e

  • SHA512

    a0918410111207ab4f7574b80038017fc4f8454ac79adc7d4f344c81ee9db54f713938c6f9469c4c73f0bf41e845415f3bcfdf2e279c6f6e536727bd7d94ffda

  • SSDEEP

    12288:bMrPy90bZLwgLt7bQPxi5F7QeFaOMsaA/w3PqBomZyqjWWC:kyEZLwm8gQeLOpPqBou3LC

Malware Config

Extracted

Family

redline

Botnet

maxud

C2

217.196.96.101:4132

Attributes
  • auth_value

    f1403d964c52b6641ba1ef14803e6e74

Targets

    • Target

      4779ee29664b150899abe4e84816939d25dea81dca306c21679eb9ae5fcf286e

    • Size

      479KB

    • MD5

      ddb5b513f83eb70611071203a695403c

    • SHA1

      3cd5bc9241ad3ab2965d4b98ac562336a7fed0eb

    • SHA256

      4779ee29664b150899abe4e84816939d25dea81dca306c21679eb9ae5fcf286e

    • SHA512

      a0918410111207ab4f7574b80038017fc4f8454ac79adc7d4f344c81ee9db54f713938c6f9469c4c73f0bf41e845415f3bcfdf2e279c6f6e536727bd7d94ffda

    • SSDEEP

      12288:bMrPy90bZLwgLt7bQPxi5F7QeFaOMsaA/w3PqBomZyqjWWC:kyEZLwm8gQeLOpPqBou3LC

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks