General

  • Target

    7be94813669601adf1c2486a165dbf5f3317bbcadad72272509b5820f2a20dff

  • Size

    478KB

  • Sample

    230213-2fln2sgb6x

  • MD5

    3ab12afc1a30cbdb0c3da2d84ab1bbcb

  • SHA1

    ab0725be45a171e263d27771aa56193545b66464

  • SHA256

    7be94813669601adf1c2486a165dbf5f3317bbcadad72272509b5820f2a20dff

  • SHA512

    6cd7d8e4dc7be9a318c51d01cbcd57797cae017f37e92dea304987e114a226e5787de46b587cdbab49619b0fbe35db3b645fdaaf28a01b383ee09553aa0af799

  • SSDEEP

    6144:KZy+bnr+Lp0yN90QEwvlRj1yuwT2vUnDHSybHW/FweEGePQZJAm2qpza88+kpC:DMrjy90Stp1yulm3HW/eYyU2q88BMC

Malware Config

Extracted

Family

redline

Botnet

fusa

C2

193.233.20.12:4132

Attributes
  • auth_value

    a08b2f01bd2af756e38c5dd60e87e697

Targets

    • Target

      7be94813669601adf1c2486a165dbf5f3317bbcadad72272509b5820f2a20dff

    • Size

      478KB

    • MD5

      3ab12afc1a30cbdb0c3da2d84ab1bbcb

    • SHA1

      ab0725be45a171e263d27771aa56193545b66464

    • SHA256

      7be94813669601adf1c2486a165dbf5f3317bbcadad72272509b5820f2a20dff

    • SHA512

      6cd7d8e4dc7be9a318c51d01cbcd57797cae017f37e92dea304987e114a226e5787de46b587cdbab49619b0fbe35db3b645fdaaf28a01b383ee09553aa0af799

    • SSDEEP

      6144:KZy+bnr+Lp0yN90QEwvlRj1yuwT2vUnDHSybHW/FweEGePQZJAm2qpza88+kpC:DMrjy90Stp1yulm3HW/eYyU2q88BMC

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks