General

  • Target

    19dd4f041422b9f5267c41fe1d7e33d5928f6146d90638bab8a80ffb673f088a

  • Size

    1000KB

  • Sample

    230216-n953wshd84

  • MD5

    bf9baf1ca545a82ae67bcdd55ad45c92

  • SHA1

    af7d728bd6db6d8b8e9151c787ba88f80ab72ef3

  • SHA256

    19dd4f041422b9f5267c41fe1d7e33d5928f6146d90638bab8a80ffb673f088a

  • SHA512

    bb39fa5a15611b1e1f7bee18a5eac7559c9df5380ba471d3a559d3e8c39a6be68d3aa9209141ca2ddc3bb68971404d44165fdcdee396b01004dc66248c502aec

  • SSDEEP

    12288:7Mrny90I3Ia0T8h3rruf50OpYnxZHKcMEav7Qa+/C6Re7Ao/U66YMTF+ExW9:IynYa0TObaRvYfqrCza6cEos/kExQ

Malware Config

Extracted

Family

redline

Botnet

dubka

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5a9421183a033f283b2f23139b471f0

Extracted

Family

redline

Botnet

nock

C2

176.113.115.17:4132

Attributes
  • auth_value

    f32d3c6ff0a9a7632c60a2b045a9cde6

Targets

    • Target

      19dd4f041422b9f5267c41fe1d7e33d5928f6146d90638bab8a80ffb673f088a

    • Size

      1000KB

    • MD5

      bf9baf1ca545a82ae67bcdd55ad45c92

    • SHA1

      af7d728bd6db6d8b8e9151c787ba88f80ab72ef3

    • SHA256

      19dd4f041422b9f5267c41fe1d7e33d5928f6146d90638bab8a80ffb673f088a

    • SHA512

      bb39fa5a15611b1e1f7bee18a5eac7559c9df5380ba471d3a559d3e8c39a6be68d3aa9209141ca2ddc3bb68971404d44165fdcdee396b01004dc66248c502aec

    • SSDEEP

      12288:7Mrny90I3Ia0T8h3rruf50OpYnxZHKcMEav7Qa+/C6Re7Ao/U66YMTF+ExW9:IynYa0TObaRvYfqrCza6cEos/kExQ

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks