General

  • Target

    c3cb6c5a8a5d0edcec2071c4ba371f5ba77ef5186e3b8ff7f666aa724563e4ca

  • Size

    1.0MB

  • Sample

    230525-wcla8acc2x

  • MD5

    9cbe8ce22ca1cd6e87fb2cf3d1b5f7d1

  • SHA1

    2c910785ecaedee4a07bf8e3aa53526cfa882373

  • SHA256

    c3cb6c5a8a5d0edcec2071c4ba371f5ba77ef5186e3b8ff7f666aa724563e4ca

  • SHA512

    e1a795c92a65d30749c034e2c9f437795add0e36311a603ea4e9ab713edda7e93873116ce450a49de6f840c8ae6f1b31a01df030682c0740431a66d7aeefff4b

  • SSDEEP

    24576:ayeiWbCiMb+wKQW5ogQa6ODVoCX61zLaq:hWbeK4XtiHXS

Malware Config

Extracted

Family

redline

Botnet

lina

C2

83.97.73.122:19062

Attributes
  • auth_value

    13523aee5d194d7716b22eeab7de10ad

Targets

    • Target

      c3cb6c5a8a5d0edcec2071c4ba371f5ba77ef5186e3b8ff7f666aa724563e4ca

    • Size

      1.0MB

    • MD5

      9cbe8ce22ca1cd6e87fb2cf3d1b5f7d1

    • SHA1

      2c910785ecaedee4a07bf8e3aa53526cfa882373

    • SHA256

      c3cb6c5a8a5d0edcec2071c4ba371f5ba77ef5186e3b8ff7f666aa724563e4ca

    • SHA512

      e1a795c92a65d30749c034e2c9f437795add0e36311a603ea4e9ab713edda7e93873116ce450a49de6f840c8ae6f1b31a01df030682c0740431a66d7aeefff4b

    • SSDEEP

      24576:ayeiWbCiMb+wKQW5ogQa6ODVoCX61zLaq:hWbeK4XtiHXS

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks