General

  • Target

    ba55bf036976b70686ab2108fd4ca3d7cc0dc6cd0f4f0ae3b091149bde946c3e

  • Size

    819KB

  • Sample

    230215-lebvfsbc22

  • MD5

    1b537338d1b1437f67cb0d4e8d579c97

  • SHA1

    0348d6cfac69cee1ea0d5c21f78e2fbc86b1b66f

  • SHA256

    ba55bf036976b70686ab2108fd4ca3d7cc0dc6cd0f4f0ae3b091149bde946c3e

  • SHA512

    99692d279a20e5a2f04bc0325aa36847bd534353b94922b48c688a415a76c8ce4a38244a223a38ed13d68be60d60e7dc1d4538ea31e3da27184d374216885122

  • SSDEEP

    12288:eMrXy902dQLKa1z9Ck7tfD0dQt+qTuZd6mdosr8Fkgn/O3ebDWVjx0HZN5pOYv6C:pyvQLKa1sk7t0dQmd6wyuyW30/OOz

Malware Config

Extracted

Family

redline

Botnet

dubka

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5a9421183a033f283b2f23139b471f0

Targets

    • Target

      ba55bf036976b70686ab2108fd4ca3d7cc0dc6cd0f4f0ae3b091149bde946c3e

    • Size

      819KB

    • MD5

      1b537338d1b1437f67cb0d4e8d579c97

    • SHA1

      0348d6cfac69cee1ea0d5c21f78e2fbc86b1b66f

    • SHA256

      ba55bf036976b70686ab2108fd4ca3d7cc0dc6cd0f4f0ae3b091149bde946c3e

    • SHA512

      99692d279a20e5a2f04bc0325aa36847bd534353b94922b48c688a415a76c8ce4a38244a223a38ed13d68be60d60e7dc1d4538ea31e3da27184d374216885122

    • SSDEEP

      12288:eMrXy902dQLKa1z9Ck7tfD0dQt+qTuZd6mdosr8Fkgn/O3ebDWVjx0HZN5pOYv6C:pyvQLKa1sk7t0dQmd6wyuyW30/OOz

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks