Resubmissions

29-10-2024 12:53

241029-p43w1svhqq 10

17-02-2023 04:03

230217-emb2vsdb7t 10

General

  • Target

    96839af0c862452df4c7174046558bb5ecac81b946fc3be678d12959cb28b106

  • Size

    701KB

  • Sample

    230217-emb2vsdb7t

  • MD5

    a2e04ca89b75e907f1dbf7df13c6cd79

  • SHA1

    a74db2ebdb369c49c0945ab1e6aa426702ccf832

  • SHA256

    96839af0c862452df4c7174046558bb5ecac81b946fc3be678d12959cb28b106

  • SHA512

    9c2d9a3c318e958862ab7865bfd9c83f5a42ae83993103fc2393c0029ef9e2c0258ae53fa53442022903efd3f5c5c9b2dd25cc0f4411d7d4d38971334f41b314

  • SSDEEP

    12288:nMr9y90DrxGGlfwh4VvQiYhHTaR1xPGAAshMQT65HGhcl4NEtHXTJ1r6Jz:GyKxGGlfweQiNx9MQT65HGmOYHXvr6Jz

Malware Config

Extracted

Family

redline

Botnet

dubka

C2

193.233.20.13:4136

Attributes
  • auth_value

    e5a9421183a033f283b2f23139b471f0

Extracted

Family

redline

Botnet

nock

C2

176.113.115.17:4132

Attributes
  • auth_value

    f32d3c6ff0a9a7632c60a2b045a9cde6

Targets

    • Target

      96839af0c862452df4c7174046558bb5ecac81b946fc3be678d12959cb28b106

    • Size

      701KB

    • MD5

      a2e04ca89b75e907f1dbf7df13c6cd79

    • SHA1

      a74db2ebdb369c49c0945ab1e6aa426702ccf832

    • SHA256

      96839af0c862452df4c7174046558bb5ecac81b946fc3be678d12959cb28b106

    • SHA512

      9c2d9a3c318e958862ab7865bfd9c83f5a42ae83993103fc2393c0029ef9e2c0258ae53fa53442022903efd3f5c5c9b2dd25cc0f4411d7d4d38971334f41b314

    • SSDEEP

      12288:nMr9y90DrxGGlfwh4VvQiYhHTaR1xPGAAshMQT65HGhcl4NEtHXTJ1r6Jz:GyKxGGlfweQiNx9MQT65HGmOYHXvr6Jz

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks