General

  • Target

    040e3511097cebf811e2861091f31e02d1c4a55ebbf6104d3e2ef0941602a62e

  • Size

    769KB

  • Sample

    230525-vl8x7sca7s

  • MD5

    8c6695cbf26276a8a3c7d5fb1193ae83

  • SHA1

    c614cc2769f1fdaa71eed4ae9a916727d6ac6417

  • SHA256

    040e3511097cebf811e2861091f31e02d1c4a55ebbf6104d3e2ef0941602a62e

  • SHA512

    ed8f272164e8756884b27e5678c23cdaa06f4fc38937ec803f5483728996bcaf237d6131ae3b154fe80247374af46047ef219c6f0fbf9e5d5260c8d75f82f195

  • SSDEEP

    24576:Jyqsh4uSB9hszo0kvnyFl/gouXj+K72bI:8bWuSBIzF9lef7

Malware Config

Extracted

Family

redline

Botnet

mina

C2

83.97.73.122:19062

Attributes
  • auth_value

    3d04bf4b8ba2a11c4dcf9df0e388fa05

Targets

    • Target

      040e3511097cebf811e2861091f31e02d1c4a55ebbf6104d3e2ef0941602a62e

    • Size

      769KB

    • MD5

      8c6695cbf26276a8a3c7d5fb1193ae83

    • SHA1

      c614cc2769f1fdaa71eed4ae9a916727d6ac6417

    • SHA256

      040e3511097cebf811e2861091f31e02d1c4a55ebbf6104d3e2ef0941602a62e

    • SHA512

      ed8f272164e8756884b27e5678c23cdaa06f4fc38937ec803f5483728996bcaf237d6131ae3b154fe80247374af46047ef219c6f0fbf9e5d5260c8d75f82f195

    • SSDEEP

      24576:Jyqsh4uSB9hszo0kvnyFl/gouXj+K72bI:8bWuSBIzF9lef7

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks