General

  • Target

    6db6a663e887e86ac18532e4f477f61e2c9e181e4ab1f384c72b7c892aeb8b30

  • Size

    536KB

  • Sample

    230214-x989zsfg26

  • MD5

    bf40b15d8b1c47d088c5edebbc8343e8

  • SHA1

    920ffab6207ff092c9e68b95e6fdbd2ae0029bb1

  • SHA256

    6db6a663e887e86ac18532e4f477f61e2c9e181e4ab1f384c72b7c892aeb8b30

  • SHA512

    e267aca80bbcebdc855ce0d205597ceeed212f04596eca48ee1374d44afae329480f1df99d113b36a9a04212a5d7d16253c16a664a01bff4a525adef6636ee0b

  • SSDEEP

    12288:1Mruy90BQWaBdqje2I8otbmLWR0TNlXoziMTQXQG:fy9WGqjhn2b6PXoziQFG

Malware Config

Extracted

Family

redline

Botnet

dubka

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5a9421183a033f283b2f23139b471f0

Targets

    • Target

      6db6a663e887e86ac18532e4f477f61e2c9e181e4ab1f384c72b7c892aeb8b30

    • Size

      536KB

    • MD5

      bf40b15d8b1c47d088c5edebbc8343e8

    • SHA1

      920ffab6207ff092c9e68b95e6fdbd2ae0029bb1

    • SHA256

      6db6a663e887e86ac18532e4f477f61e2c9e181e4ab1f384c72b7c892aeb8b30

    • SHA512

      e267aca80bbcebdc855ce0d205597ceeed212f04596eca48ee1374d44afae329480f1df99d113b36a9a04212a5d7d16253c16a664a01bff4a525adef6636ee0b

    • SSDEEP

      12288:1Mruy90BQWaBdqje2I8otbmLWR0TNlXoziMTQXQG:fy9WGqjhn2b6PXoziQFG

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks