General

  • Target

    585b470dadcd96ca9a772182b4fedd91eed4eb86c3296f63894af90bdcc817f3

  • Size

    1.2MB

  • Sample

    230506-1xyt9scc8z

  • MD5

    99105a6cd9ef0b459023707d0ed76902

  • SHA1

    0dda6c06bb1b8bce4b4f0c6802c123a0b55a52cc

  • SHA256

    585b470dadcd96ca9a772182b4fedd91eed4eb86c3296f63894af90bdcc817f3

  • SHA512

    918abcf149450862d10310e93d809aa5d44962b9d68b2f5ea66e610d1dceb30ec41cdb70d466ac58be9230678726f71d0abf5d2f352ada591af133eeb3ae60bb

  • SSDEEP

    24576:UynRnKm/Y1ZpLEfkUicXom9/AVSmWmfZEf3j5Dp/RHGAITcv:jsm/USiEF/AVMmCFDBKT

Malware Config

Extracted

Family

redline

Botnet

lupa

C2

217.196.96.56:4138

Attributes
  • auth_value

    fcb02fce9bc10c56a9841d56974bd7b8

Targets

    • Target

      585b470dadcd96ca9a772182b4fedd91eed4eb86c3296f63894af90bdcc817f3

    • Size

      1.2MB

    • MD5

      99105a6cd9ef0b459023707d0ed76902

    • SHA1

      0dda6c06bb1b8bce4b4f0c6802c123a0b55a52cc

    • SHA256

      585b470dadcd96ca9a772182b4fedd91eed4eb86c3296f63894af90bdcc817f3

    • SHA512

      918abcf149450862d10310e93d809aa5d44962b9d68b2f5ea66e610d1dceb30ec41cdb70d466ac58be9230678726f71d0abf5d2f352ada591af133eeb3ae60bb

    • SSDEEP

      24576:UynRnKm/Y1ZpLEfkUicXom9/AVSmWmfZEf3j5Dp/RHGAITcv:jsm/USiEF/AVMmCFDBKT

    • Detects Redline Stealer samples

      This rule detects the presence of Redline Stealer samples based on their unique strings.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks