General

  • Target

    e04ce894af4b79be7b41cd23ca29b3270be39d835f5acd0917c756508a6bb7bb

  • Size

    770KB

  • Sample

    230511-cnajbabc23

  • MD5

    1d4f390a655e4c5158ce5d556e497845

  • SHA1

    5816a1c73967e3546be4fe068305cefe8381cf8a

  • SHA256

    e04ce894af4b79be7b41cd23ca29b3270be39d835f5acd0917c756508a6bb7bb

  • SHA512

    802dd9a024abbdad73a112a10d0cdf9d782c271cd5ceb76ad2dac21b5480e51a43f6f108780b3774cf9543182c4dbb2d8676b379dfa4d5eaca8ea901be60f7dc

  • SSDEEP

    12288:cMrly90dLWEZsDTQsQ22KWg6+KNPi3ZFOiBGFRXPIuSR8Whl9+A08:Byh1PQ1KZeSc397WhlIN8

Malware Config

Extracted

Family

redline

Botnet

debro

C2

185.161.248.75:4132

Attributes
  • auth_value

    18c2c191aebfde5d1787ec8d805a01a8

Targets

    • Target

      e04ce894af4b79be7b41cd23ca29b3270be39d835f5acd0917c756508a6bb7bb

    • Size

      770KB

    • MD5

      1d4f390a655e4c5158ce5d556e497845

    • SHA1

      5816a1c73967e3546be4fe068305cefe8381cf8a

    • SHA256

      e04ce894af4b79be7b41cd23ca29b3270be39d835f5acd0917c756508a6bb7bb

    • SHA512

      802dd9a024abbdad73a112a10d0cdf9d782c271cd5ceb76ad2dac21b5480e51a43f6f108780b3774cf9543182c4dbb2d8676b379dfa4d5eaca8ea901be60f7dc

    • SSDEEP

      12288:cMrly90dLWEZsDTQsQ22KWg6+KNPi3ZFOiBGFRXPIuSR8Whl9+A08:Byh1PQ1KZeSc397WhlIN8

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks