General

  • Target

    eed63ef6bec0fec8d981770dcdabad823bedc7a90ce177f344555a46a4362b09

  • Size

    556KB

  • Sample

    230217-ankceacg86

  • MD5

    be15abcf56baca3f7e4e05fbac3fedf9

  • SHA1

    24848fdf6fb852aab30a70fb1de77bda35ebb886

  • SHA256

    eed63ef6bec0fec8d981770dcdabad823bedc7a90ce177f344555a46a4362b09

  • SHA512

    d61701027624557e38fd75ba67831e8caef1ef75d955b6a9b0373c4c1c67750c5b5add904e78d0f1ab24460fe1f5877fc7a8c61df78c6aff58ed326e668408a3

  • SSDEEP

    12288:BMrUy908FTDVOZ18GxdJLzy+TxLJOjd7nT/NOBRd:NyfFnVaH1FLJmxT/wbd

Malware Config

Extracted

Family

redline

Botnet

dubka

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5a9421183a033f283b2f23139b471f0

Targets

    • Target

      eed63ef6bec0fec8d981770dcdabad823bedc7a90ce177f344555a46a4362b09

    • Size

      556KB

    • MD5

      be15abcf56baca3f7e4e05fbac3fedf9

    • SHA1

      24848fdf6fb852aab30a70fb1de77bda35ebb886

    • SHA256

      eed63ef6bec0fec8d981770dcdabad823bedc7a90ce177f344555a46a4362b09

    • SHA512

      d61701027624557e38fd75ba67831e8caef1ef75d955b6a9b0373c4c1c67750c5b5add904e78d0f1ab24460fe1f5877fc7a8c61df78c6aff58ed326e668408a3

    • SSDEEP

      12288:BMrUy908FTDVOZ18GxdJLzy+TxLJOjd7nT/NOBRd:NyfFnVaH1FLJmxT/wbd

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks