General

  • Target

    694240b8eb72ac90d1ca0c7de3596c88aee1445e01d563e69af2733c5c030020

  • Size

    825KB

  • Sample

    230210-n2jjxseg6v

  • MD5

    053e26971252d82c649234677d1b1926

  • SHA1

    669fe04993ef9fa5f52371102cdf174efe0c6c9c

  • SHA256

    694240b8eb72ac90d1ca0c7de3596c88aee1445e01d563e69af2733c5c030020

  • SHA512

    a3903cb3f0ecde56c59fe780950900df93c6892663341914533355e6cf9932d41cb8058b209a18ab31a65c47343b471a42c283243d6d15f57fac16ff887321b0

  • SSDEEP

    24576:Wy4XeBxnmf4nArKumRCzMIsuyX9mHS5g5:l4OBxmf9mDhX9mHS5g

Malware Config

Extracted

Family

redline

Botnet

dubna

C2

193.233.20.11:4131

Attributes
  • auth_value

    f324b1269094b7462e56bab025f032f4

Targets

    • Target

      694240b8eb72ac90d1ca0c7de3596c88aee1445e01d563e69af2733c5c030020

    • Size

      825KB

    • MD5

      053e26971252d82c649234677d1b1926

    • SHA1

      669fe04993ef9fa5f52371102cdf174efe0c6c9c

    • SHA256

      694240b8eb72ac90d1ca0c7de3596c88aee1445e01d563e69af2733c5c030020

    • SHA512

      a3903cb3f0ecde56c59fe780950900df93c6892663341914533355e6cf9932d41cb8058b209a18ab31a65c47343b471a42c283243d6d15f57fac16ff887321b0

    • SSDEEP

      24576:Wy4XeBxnmf4nArKumRCzMIsuyX9mHS5g5:l4OBxmf9mDhX9mHS5g

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks