General

  • Target

    55746bdf06316ae8968e97125f24f43f012412ec64704b66a2d875c44fb03410

  • Size

    557KB

  • Sample

    230217-ce6v6adc57

  • MD5

    9aeb43da6a473f6cf5f9e161435e37bb

  • SHA1

    905cbe2bda68ec85575089b997d2c5256519a39b

  • SHA256

    55746bdf06316ae8968e97125f24f43f012412ec64704b66a2d875c44fb03410

  • SHA512

    e50206e10ccabd1d6eb7aac45b2d97df0d30e006c21d8ad3861c76812a4b8215a3e3cc5847850ad27e63e5de737b6f295e02de4e6aace986f9824d98a6d24c12

  • SSDEEP

    12288:tMrKy90ScOECqh4ASST30qO74fLi48VfVfSpcwvcd8BG/Z:jyCCy4ZLq85hSpcwESBq

Malware Config

Extracted

Family

redline

Botnet

fukia

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5783636fbd9e4f0cf9a017bce02e67e

Targets

    • Target

      55746bdf06316ae8968e97125f24f43f012412ec64704b66a2d875c44fb03410

    • Size

      557KB

    • MD5

      9aeb43da6a473f6cf5f9e161435e37bb

    • SHA1

      905cbe2bda68ec85575089b997d2c5256519a39b

    • SHA256

      55746bdf06316ae8968e97125f24f43f012412ec64704b66a2d875c44fb03410

    • SHA512

      e50206e10ccabd1d6eb7aac45b2d97df0d30e006c21d8ad3861c76812a4b8215a3e3cc5847850ad27e63e5de737b6f295e02de4e6aace986f9824d98a6d24c12

    • SSDEEP

      12288:tMrKy90ScOECqh4ASST30qO74fLi48VfVfSpcwvcd8BG/Z:jyCCy4ZLq85hSpcwESBq

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks