General

  • Target

    fe4fc85bdc2d083252848d698e35f925dba63370f8ab9eb08c40a6bca745dd44

  • Size

    500KB

  • Sample

    230216-1bx1vabg6x

  • MD5

    e74af7df71b109ec3b23aa7276e1aec3

  • SHA1

    d0de4bc1675ba2a94e34aa707266c1d1fb1a86c7

  • SHA256

    fe4fc85bdc2d083252848d698e35f925dba63370f8ab9eb08c40a6bca745dd44

  • SHA512

    954ee1c28184c27b1aee202826e96f465c4783b20ace8ade0648d032926a3a86bc72b587af09700da91d836087591e4fa9d78dc6d5be855617833d2cdbf23cab

  • SSDEEP

    12288:bMrMy904OFlSZPdEvKuNsiYdtlplrDm8:HypO7SldmG3dt7lrD9

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      fe4fc85bdc2d083252848d698e35f925dba63370f8ab9eb08c40a6bca745dd44

    • Size

      500KB

    • MD5

      e74af7df71b109ec3b23aa7276e1aec3

    • SHA1

      d0de4bc1675ba2a94e34aa707266c1d1fb1a86c7

    • SHA256

      fe4fc85bdc2d083252848d698e35f925dba63370f8ab9eb08c40a6bca745dd44

    • SHA512

      954ee1c28184c27b1aee202826e96f465c4783b20ace8ade0648d032926a3a86bc72b587af09700da91d836087591e4fa9d78dc6d5be855617833d2cdbf23cab

    • SSDEEP

      12288:bMrMy904OFlSZPdEvKuNsiYdtlplrDm8:HypO7SldmG3dt7lrD9

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks