General

  • Target

    e353237c6cd7956a7dd58e86a6de7e7169a2658c43d7d2da7681760506051ddc

  • Size

    811KB

  • Sample

    230215-t7mrescf2w

  • MD5

    7d8ec724d2b1576c14c37ac97375a9f9

  • SHA1

    c5ffe546319bccf15f7cbe6d2b59a71fa2669630

  • SHA256

    e353237c6cd7956a7dd58e86a6de7e7169a2658c43d7d2da7681760506051ddc

  • SHA512

    3eb48f166e9ea7f9c95486db813b8a81814c2758b37aeff0c49ed5809156fd2f3cfb13d0c00f100251247b306ee844ff285f6f8a41559602fecef5cc369a058a

  • SSDEEP

    24576:nyNhSeKldd7iQxS4jr3C2eQWdJka71p72:yN16dwJB9waJp

Malware Config

Extracted

Family

redline

Botnet

dubka

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5a9421183a033f283b2f23139b471f0

Targets

    • Target

      e353237c6cd7956a7dd58e86a6de7e7169a2658c43d7d2da7681760506051ddc

    • Size

      811KB

    • MD5

      7d8ec724d2b1576c14c37ac97375a9f9

    • SHA1

      c5ffe546319bccf15f7cbe6d2b59a71fa2669630

    • SHA256

      e353237c6cd7956a7dd58e86a6de7e7169a2658c43d7d2da7681760506051ddc

    • SHA512

      3eb48f166e9ea7f9c95486db813b8a81814c2758b37aeff0c49ed5809156fd2f3cfb13d0c00f100251247b306ee844ff285f6f8a41559602fecef5cc369a058a

    • SSDEEP

      24576:nyNhSeKldd7iQxS4jr3C2eQWdJka71p72:yN16dwJB9waJp

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks