General

  • Target

    226825b8769fb15bdfd0271f9b78a7f4d66392f30f16d1ec5b26153900a84e77

  • Size

    809KB

  • Sample

    230215-b8zhhaha7y

  • MD5

    8cfc23acc4b7244de4787364ea539a8b

  • SHA1

    80b06e9196e4a70ec69b4dc49b42b805bcef3144

  • SHA256

    226825b8769fb15bdfd0271f9b78a7f4d66392f30f16d1ec5b26153900a84e77

  • SHA512

    8be27c6b49b94fe588c43f2ff0b00d9a29a7bd7224c24a2591af98cf5e1df091caaf0605d9f2f1471f1b228272a5c9647d3b1ac60b0c916edc7864d228dd745c

  • SSDEEP

    24576:DymAvW/b1LCDCY7QDGAGEjcJGuvflKOOMG1:WpvsbpdftjKG8fHP

Malware Config

Extracted

Family

redline

Botnet

dubka

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5a9421183a033f283b2f23139b471f0

Targets

    • Target

      226825b8769fb15bdfd0271f9b78a7f4d66392f30f16d1ec5b26153900a84e77

    • Size

      809KB

    • MD5

      8cfc23acc4b7244de4787364ea539a8b

    • SHA1

      80b06e9196e4a70ec69b4dc49b42b805bcef3144

    • SHA256

      226825b8769fb15bdfd0271f9b78a7f4d66392f30f16d1ec5b26153900a84e77

    • SHA512

      8be27c6b49b94fe588c43f2ff0b00d9a29a7bd7224c24a2591af98cf5e1df091caaf0605d9f2f1471f1b228272a5c9647d3b1ac60b0c916edc7864d228dd745c

    • SSDEEP

      24576:DymAvW/b1LCDCY7QDGAGEjcJGuvflKOOMG1:WpvsbpdftjKG8fHP

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks