General

  • Target

    bd201fcf146722968df64b5f2a5095b1989af7b08cec204418118cc9e0995c31

  • Size

    770KB

  • Sample

    230511-lnvzpach32

  • MD5

    bc5a215da7b4b11c86e8559248aca49f

  • SHA1

    98184ece583d792454ad1687e4a899a52cecdd3d

  • SHA256

    bd201fcf146722968df64b5f2a5095b1989af7b08cec204418118cc9e0995c31

  • SHA512

    fd6b39719fd201ef0192fdfad9be2d50697ef9e1f7c422fe281e62e8a1570c8fb8ff986a484aabf22161f74031ec56f7ce766fb95902759460e5e3d41aef7e01

  • SSDEEP

    12288:zMrdy90QdFVOj27jzKXYALC9C+2KKzOv1aaB9zIAikSikCh4EzCZBNc:Gy/dwijoY8SPv1aaBiAjcvZBNc

Malware Config

Extracted

Family

redline

Botnet

debro

C2

185.161.248.75:4132

Attributes
  • auth_value

    18c2c191aebfde5d1787ec8d805a01a8

Targets

    • Target

      bd201fcf146722968df64b5f2a5095b1989af7b08cec204418118cc9e0995c31

    • Size

      770KB

    • MD5

      bc5a215da7b4b11c86e8559248aca49f

    • SHA1

      98184ece583d792454ad1687e4a899a52cecdd3d

    • SHA256

      bd201fcf146722968df64b5f2a5095b1989af7b08cec204418118cc9e0995c31

    • SHA512

      fd6b39719fd201ef0192fdfad9be2d50697ef9e1f7c422fe281e62e8a1570c8fb8ff986a484aabf22161f74031ec56f7ce766fb95902759460e5e3d41aef7e01

    • SSDEEP

      12288:zMrdy90QdFVOj27jzKXYALC9C+2KKzOv1aaB9zIAikSikCh4EzCZBNc:Gy/dwijoY8SPv1aaBiAjcvZBNc

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks