General

  • Target

    1cf15393229b632dbcfef533c906e050bfa8bfbaac0b6bd2ae8f73380bd1bf6a

  • Size

    821KB

  • Sample

    230215-hdxtraab8w

  • MD5

    d0d439cb25054acddc427c2964c50bee

  • SHA1

    3b025411c2c867e2941bf7af31563c4f4185330c

  • SHA256

    1cf15393229b632dbcfef533c906e050bfa8bfbaac0b6bd2ae8f73380bd1bf6a

  • SHA512

    8d72453e879ba9bff614cd7bdbe473edbd654bf236d2bdbf558cb9219f6ef90ad7138610686529f4195284b486649dc2b6bddd57768bf1cfdcb3fab7b3641be8

  • SSDEEP

    24576:bypKBLRWm2YzZzJLie4P9ipvNqjW9H0Bj:OpSRWOVzJLN4li9NhUB

Malware Config

Extracted

Family

redline

Botnet

dubka

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5a9421183a033f283b2f23139b471f0

Targets

    • Target

      1cf15393229b632dbcfef533c906e050bfa8bfbaac0b6bd2ae8f73380bd1bf6a

    • Size

      821KB

    • MD5

      d0d439cb25054acddc427c2964c50bee

    • SHA1

      3b025411c2c867e2941bf7af31563c4f4185330c

    • SHA256

      1cf15393229b632dbcfef533c906e050bfa8bfbaac0b6bd2ae8f73380bd1bf6a

    • SHA512

      8d72453e879ba9bff614cd7bdbe473edbd654bf236d2bdbf558cb9219f6ef90ad7138610686529f4195284b486649dc2b6bddd57768bf1cfdcb3fab7b3641be8

    • SSDEEP

      24576:bypKBLRWm2YzZzJLie4P9ipvNqjW9H0Bj:OpSRWOVzJLN4li9NhUB

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks