General

  • Target

    2ffc593536c148006089228f17ec90d9f794ba6797723555cbd4d9940d6eda15

  • Size

    1.0MB

  • Sample

    230520-yqsnkaed93

  • MD5

    663f25aad82a5880dce8a850284db1ee

  • SHA1

    9f30755695dda0e9c5f83b6144e641e6b581de77

  • SHA256

    2ffc593536c148006089228f17ec90d9f794ba6797723555cbd4d9940d6eda15

  • SHA512

    71d6dd3d220877986f6855213cef3e350671b058ff8d9c016ff2de8cd412bd56b6fb3287295c6f7237fccf0dc23f45093f60bb73d833f8904e9c744c6344d222

  • SSDEEP

    24576:dyT1V74WQUohqIj+lWlHJghaJfBEyTWYUH0uMV7Nnl:4jc1ThqwHJgofJTF4MV7

Malware Config

Extracted

Family

redline

Botnet

maxa

C2

77.91.124.251:19065

Attributes
  • auth_value

    3c06ec6b3eea9db7536a57bcc13f5bef

Targets

    • Target

      2ffc593536c148006089228f17ec90d9f794ba6797723555cbd4d9940d6eda15

    • Size

      1.0MB

    • MD5

      663f25aad82a5880dce8a850284db1ee

    • SHA1

      9f30755695dda0e9c5f83b6144e641e6b581de77

    • SHA256

      2ffc593536c148006089228f17ec90d9f794ba6797723555cbd4d9940d6eda15

    • SHA512

      71d6dd3d220877986f6855213cef3e350671b058ff8d9c016ff2de8cd412bd56b6fb3287295c6f7237fccf0dc23f45093f60bb73d833f8904e9c744c6344d222

    • SSDEEP

      24576:dyT1V74WQUohqIj+lWlHJghaJfBEyTWYUH0uMV7Nnl:4jc1ThqwHJgofJTF4MV7

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks