General

  • Target

    3cfd67ebb7194f40fead8d23f7c876cc92ba675735ac76ca0bf536e84a99ab53

  • Size

    810KB

  • Sample

    230215-a4r27ahb78

  • MD5

    3d303ed8841cd247e11b2fc818837f1c

  • SHA1

    9b6ee31befc18732babff8e716d84aa7984cf1ba

  • SHA256

    3cfd67ebb7194f40fead8d23f7c876cc92ba675735ac76ca0bf536e84a99ab53

  • SHA512

    42258ee29a0d1b9e26b121e40beb4242f078df671c931675f774b2bfa28a20e1786f1499ea0437fb5f248f79f20c3c8b89c80426193ab4fcdef4cb8376053f6e

  • SSDEEP

    24576:cyqB1HWSNjYbGXhyb2qRUM28DypkhyUPHO0jE8wCG:LY1H/jKTCUUMLhNPl

Malware Config

Extracted

Family

redline

Botnet

dubka

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5a9421183a033f283b2f23139b471f0

Targets

    • Target

      3cfd67ebb7194f40fead8d23f7c876cc92ba675735ac76ca0bf536e84a99ab53

    • Size

      810KB

    • MD5

      3d303ed8841cd247e11b2fc818837f1c

    • SHA1

      9b6ee31befc18732babff8e716d84aa7984cf1ba

    • SHA256

      3cfd67ebb7194f40fead8d23f7c876cc92ba675735ac76ca0bf536e84a99ab53

    • SHA512

      42258ee29a0d1b9e26b121e40beb4242f078df671c931675f774b2bfa28a20e1786f1499ea0437fb5f248f79f20c3c8b89c80426193ab4fcdef4cb8376053f6e

    • SSDEEP

      24576:cyqB1HWSNjYbGXhyb2qRUM28DypkhyUPHO0jE8wCG:LY1H/jKTCUUMLhNPl

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks