General

  • Target

    597ad14101937d820933b6161f6fa027f80c556958d88d08782dc9bc10478b55

  • Size

    924KB

  • Sample

    230506-1ynexsae86

  • MD5

    cd00bd99e5cdffbcabb6b929378e937e

  • SHA1

    6a341567793c2354821b1572af152d4c73bcaa28

  • SHA256

    597ad14101937d820933b6161f6fa027f80c556958d88d08782dc9bc10478b55

  • SHA512

    e0f9183c2c509f972bde8ffcd0f328f3972b1339caad9a2f8cf250548c28e8ffd1f941d831876abc0a50b5f439febb7d900f16ca55a6826e48a5d26b24c9813b

  • SSDEEP

    24576:2yo/JQt86cO5dhHVZXDRpXgFpaVtVkiJDexh2fHiOUt4F:F0JQt8uDVbgFetZKhMCB

Malware Config

Extracted

Family

redline

Botnet

lupa

C2

217.196.96.56:4138

Attributes
  • auth_value

    fcb02fce9bc10c56a9841d56974bd7b8

Targets

    • Target

      597ad14101937d820933b6161f6fa027f80c556958d88d08782dc9bc10478b55

    • Size

      924KB

    • MD5

      cd00bd99e5cdffbcabb6b929378e937e

    • SHA1

      6a341567793c2354821b1572af152d4c73bcaa28

    • SHA256

      597ad14101937d820933b6161f6fa027f80c556958d88d08782dc9bc10478b55

    • SHA512

      e0f9183c2c509f972bde8ffcd0f328f3972b1339caad9a2f8cf250548c28e8ffd1f941d831876abc0a50b5f439febb7d900f16ca55a6826e48a5d26b24c9813b

    • SSDEEP

      24576:2yo/JQt86cO5dhHVZXDRpXgFpaVtVkiJDexh2fHiOUt4F:F0JQt8uDVbgFetZKhMCB

    • Detects Redline Stealer samples

      This rule detects the presence of Redline Stealer samples based on their unique strings.

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks