General

  • Target

    c5eeb1a7e5d1dc1403d7320c57c5d3d5e4f019b155e567e64b97e01d5572b683

  • Size

    739KB

  • Sample

    230214-mdx7qsbh9x

  • MD5

    7b6d7b5e10103f63e791aa3c4a7cf541

  • SHA1

    7841e7fe598ec2d12ca9d060bea29e6126dd4b9b

  • SHA256

    c5eeb1a7e5d1dc1403d7320c57c5d3d5e4f019b155e567e64b97e01d5572b683

  • SHA512

    3998efeae3d77607b1da0084770dc95c0a802f6c1818ec4637e26d66d332c15e05e2ec907ba98890c1f415df9c74321f59a660b52dbc823040e7917d99b8260f

  • SSDEEP

    12288:4Mrqy90zH7A0VXicicOHhaGQMjxZQ0CiKUJ0BzEYDpyLfSA+w1XFQKgdeaj:iymbhVFybEFygE8Ew+FQPj

Malware Config

Extracted

Family

redline

Botnet

cr10

C2

176.113.115.17:4132

Attributes
  • auth_value

    0a52a09c70a98bb6612362e5eb8b1d02

Extracted

Family

redline

Botnet

dubka

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5a9421183a033f283b2f23139b471f0

Targets

    • Target

      c5eeb1a7e5d1dc1403d7320c57c5d3d5e4f019b155e567e64b97e01d5572b683

    • Size

      739KB

    • MD5

      7b6d7b5e10103f63e791aa3c4a7cf541

    • SHA1

      7841e7fe598ec2d12ca9d060bea29e6126dd4b9b

    • SHA256

      c5eeb1a7e5d1dc1403d7320c57c5d3d5e4f019b155e567e64b97e01d5572b683

    • SHA512

      3998efeae3d77607b1da0084770dc95c0a802f6c1818ec4637e26d66d332c15e05e2ec907ba98890c1f415df9c74321f59a660b52dbc823040e7917d99b8260f

    • SSDEEP

      12288:4Mrqy90zH7A0VXicicOHhaGQMjxZQ0CiKUJ0BzEYDpyLfSA+w1XFQKgdeaj:iymbhVFybEFygE8Ew+FQPj

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks