General

  • Target

    4cb4f724c41c034a9e6ad0cf63694d6d80940acbdf0b0681444981b086faa9db

  • Size

    769KB

  • Sample

    230511-cwpcfadb4z

  • MD5

    ec27dcdfb0a17729b9c9f9c53cb16d99

  • SHA1

    f336fd262978724f6c5f964ac730bfea233f7f3f

  • SHA256

    4cb4f724c41c034a9e6ad0cf63694d6d80940acbdf0b0681444981b086faa9db

  • SHA512

    71380507422415ae33715053627b48916d4d50dd229fa77272f736b47859dad8182c21c9faf6c4d22b93802deb0f0c07501e186a6f7c77d98373ec0536f453c1

  • SSDEEP

    24576:FywRnhq5s5i+y78jTKczctAiW4WjXOv2cJCjO1wnFk:gwRnhN5O8jTKlTWBXk2cr1

Malware Config

Extracted

Family

redline

Botnet

mixa

C2

185.161.248.75:4132

Attributes
  • auth_value

    9d14534b25ac495ab25b59800acf3bb2

Targets

    • Target

      4cb4f724c41c034a9e6ad0cf63694d6d80940acbdf0b0681444981b086faa9db

    • Size

      769KB

    • MD5

      ec27dcdfb0a17729b9c9f9c53cb16d99

    • SHA1

      f336fd262978724f6c5f964ac730bfea233f7f3f

    • SHA256

      4cb4f724c41c034a9e6ad0cf63694d6d80940acbdf0b0681444981b086faa9db

    • SHA512

      71380507422415ae33715053627b48916d4d50dd229fa77272f736b47859dad8182c21c9faf6c4d22b93802deb0f0c07501e186a6f7c77d98373ec0536f453c1

    • SSDEEP

      24576:FywRnhq5s5i+y78jTKczctAiW4WjXOv2cJCjO1wnFk:gwRnhN5O8jTKlTWBXk2cr1

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks