General

  • Target

    338b4a0819a070628de275c31d799701767f0fc4b84556f9b68d48bcb7579da6

  • Size

    471KB

  • Sample

    230214-j84ffsbh89

  • MD5

    06180a6296613b9eb79d2dd696706462

  • SHA1

    62851779092c4975652555b8cc77e32ca1528fbb

  • SHA256

    338b4a0819a070628de275c31d799701767f0fc4b84556f9b68d48bcb7579da6

  • SHA512

    e370d45a52243ad9cff59f162bfdfe7a6c1ff164d4c1418a003e65dae1878ac27fdb19aee05e89d8b5ec21a494b78da398877be644763bd1d428a1133cc25fa5

  • SSDEEP

    12288:7Mrty90DES0TpoXRVVFJT6lD9AxHITzHDPIWn:KytS0ToRrT6lRwoTjx

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      338b4a0819a070628de275c31d799701767f0fc4b84556f9b68d48bcb7579da6

    • Size

      471KB

    • MD5

      06180a6296613b9eb79d2dd696706462

    • SHA1

      62851779092c4975652555b8cc77e32ca1528fbb

    • SHA256

      338b4a0819a070628de275c31d799701767f0fc4b84556f9b68d48bcb7579da6

    • SHA512

      e370d45a52243ad9cff59f162bfdfe7a6c1ff164d4c1418a003e65dae1878ac27fdb19aee05e89d8b5ec21a494b78da398877be644763bd1d428a1133cc25fa5

    • SSDEEP

      12288:7Mrty90DES0TpoXRVVFJT6lD9AxHITzHDPIWn:KytS0ToRrT6lRwoTjx

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks