General

  • Target

    f6345cb07cec549f1eab47ccdf21b382dcd65ece24be29ecc3e82d11a5e848d9

  • Size

    483KB

  • Sample

    230216-bc2yraef6z

  • MD5

    df41b1217078bd6b12e68907a184519c

  • SHA1

    d0e36bff18324827374dbab4f786da81b18167ba

  • SHA256

    f6345cb07cec549f1eab47ccdf21b382dcd65ece24be29ecc3e82d11a5e848d9

  • SHA512

    8121443ad68ca20ee9502ad864ee2582883b1af2da6d77ba37bbd29848f2dd1c069acef2f544c7792600c2b2490326e86bc53eac792e74850c5588d2cf5ba590

  • SSDEEP

    12288:JMrXy90WApFMu1iiKEjLzKl6bCSYZB7SZrj76Y:mygMucMM7Sd7N

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      f6345cb07cec549f1eab47ccdf21b382dcd65ece24be29ecc3e82d11a5e848d9

    • Size

      483KB

    • MD5

      df41b1217078bd6b12e68907a184519c

    • SHA1

      d0e36bff18324827374dbab4f786da81b18167ba

    • SHA256

      f6345cb07cec549f1eab47ccdf21b382dcd65ece24be29ecc3e82d11a5e848d9

    • SHA512

      8121443ad68ca20ee9502ad864ee2582883b1af2da6d77ba37bbd29848f2dd1c069acef2f544c7792600c2b2490326e86bc53eac792e74850c5588d2cf5ba590

    • SSDEEP

      12288:JMrXy90WApFMu1iiKEjLzKl6bCSYZB7SZrj76Y:mygMucMM7Sd7N

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks