General

  • Target

    49fa37c0c3fe9b71cbc45d2ef964e18e1ea0c419715c41d0f628f03abca8649c

  • Size

    770KB

  • Sample

    230511-ed98asdd8x

  • MD5

    1367dd99e9638a11468451a5b7c0c3da

  • SHA1

    448a9f7f72af2821dca94daabd5b74aa445c6b91

  • SHA256

    49fa37c0c3fe9b71cbc45d2ef964e18e1ea0c419715c41d0f628f03abca8649c

  • SHA512

    4dc21809b321975bc28f3defa27015f584a929b1df98241a93f0fd4e6867aa3b9f35d82fed379c44828cacfb8859484e6bf8c2ddaf097e445d4849dffc621909

  • SSDEEP

    24576:xytIeJKcKL3+vSG7aXGuzUsiRXepHoWYuG:k2eyKSOaXLMKHoW

Malware Config

Extracted

Family

redline

Botnet

debro

C2

185.161.248.75:4132

Attributes
  • auth_value

    18c2c191aebfde5d1787ec8d805a01a8

Targets

    • Target

      49fa37c0c3fe9b71cbc45d2ef964e18e1ea0c419715c41d0f628f03abca8649c

    • Size

      770KB

    • MD5

      1367dd99e9638a11468451a5b7c0c3da

    • SHA1

      448a9f7f72af2821dca94daabd5b74aa445c6b91

    • SHA256

      49fa37c0c3fe9b71cbc45d2ef964e18e1ea0c419715c41d0f628f03abca8649c

    • SHA512

      4dc21809b321975bc28f3defa27015f584a929b1df98241a93f0fd4e6867aa3b9f35d82fed379c44828cacfb8859484e6bf8c2ddaf097e445d4849dffc621909

    • SSDEEP

      24576:xytIeJKcKL3+vSG7aXGuzUsiRXepHoWYuG:k2eyKSOaXLMKHoW

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks