General

  • Target

    513b60324e295924a404b559b8baa85ebce1569b296dd7c7ed8129a731deb421

  • Size

    1.1MB

  • Sample

    230515-wsgb7sfc4s

  • MD5

    ca68c8dc7d46904902e1a4f1212ac60f

  • SHA1

    5e5bec853dea241ca02752e77cbe6bcddd0c9447

  • SHA256

    513b60324e295924a404b559b8baa85ebce1569b296dd7c7ed8129a731deb421

  • SHA512

    cb747a6cad855cf5f57d65a7935e4312a511363f6bf89430d106772daa4a615430c7e55af8fe85a289acc8da4cff6b12633d816ffd496a90e776e83ee5899c1c

  • SSDEEP

    24576:EyhL/BfibJDWrfgQ7kkhb9jHFXCv67e5o66YJw8AU:Thdq9DWDgLEHUy7ko5YJA

Malware Config

Extracted

Family

redline

Botnet

ment

C2

185.161.248.25:4132

Attributes
  • auth_value

    650f2fd9e43f18bed6e23c78d8cfb0af

Extracted

Family

redline

Botnet

naher

C2

185.161.248.25:4132

Attributes
  • auth_value

    91f06fcf80f600c56b2797e1c73d214d

Extracted

Family

redline

Botnet

demis

C2

185.161.248.25:4132

Attributes
  • auth_value

    8a9a54cb72dc3d7ab6792d3a28b3d1e1

Targets

    • Target

      513b60324e295924a404b559b8baa85ebce1569b296dd7c7ed8129a731deb421

    • Size

      1.1MB

    • MD5

      ca68c8dc7d46904902e1a4f1212ac60f

    • SHA1

      5e5bec853dea241ca02752e77cbe6bcddd0c9447

    • SHA256

      513b60324e295924a404b559b8baa85ebce1569b296dd7c7ed8129a731deb421

    • SHA512

      cb747a6cad855cf5f57d65a7935e4312a511363f6bf89430d106772daa4a615430c7e55af8fe85a289acc8da4cff6b12633d816ffd496a90e776e83ee5899c1c

    • SSDEEP

      24576:EyhL/BfibJDWrfgQ7kkhb9jHFXCv67e5o66YJw8AU:Thdq9DWDgLEHUy7ko5YJA

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks