General

  • Target

    7e02d67fff32b6d175d0a5803d625688f7b5cf07452c437874d0ff375aa4daba

  • Size

    478KB

  • Sample

    230214-w2awsaef41

  • MD5

    602e43944b161d1be0f1f95d3ec749b5

  • SHA1

    f736d52520034a000f4326a0968e89f6ca22cb69

  • SHA256

    7e02d67fff32b6d175d0a5803d625688f7b5cf07452c437874d0ff375aa4daba

  • SHA512

    f26a345d79602dd34fe3b837b88d7e69efbbc26819c6ebeb087c2961f42ee08375eaf2a76c87bb035a8a44083389e1bbc4abe0f200bae734289f709557e5d9a1

  • SSDEEP

    12288:oMrOy90piEekqNc98HQmrQVZKcKH5Q9dacig:my5hkaAQQmsVvKZ0ajg

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      7e02d67fff32b6d175d0a5803d625688f7b5cf07452c437874d0ff375aa4daba

    • Size

      478KB

    • MD5

      602e43944b161d1be0f1f95d3ec749b5

    • SHA1

      f736d52520034a000f4326a0968e89f6ca22cb69

    • SHA256

      7e02d67fff32b6d175d0a5803d625688f7b5cf07452c437874d0ff375aa4daba

    • SHA512

      f26a345d79602dd34fe3b837b88d7e69efbbc26819c6ebeb087c2961f42ee08375eaf2a76c87bb035a8a44083389e1bbc4abe0f200bae734289f709557e5d9a1

    • SSDEEP

      12288:oMrOy90piEekqNc98HQmrQVZKcKH5Q9dacig:my5hkaAQQmsVvKZ0ajg

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks