General

  • Target

    75425bae3bb52062a957b0d26bf5b0291e76c61a88746cd10ae300643322672a

  • Size

    756KB

  • Sample

    230601-28nn4sgh63

  • MD5

    9fb81d5df5482d9345a669c97dd15922

  • SHA1

    bdfcd981ed07accd5a148a6a7a553f6f45afed90

  • SHA256

    75425bae3bb52062a957b0d26bf5b0291e76c61a88746cd10ae300643322672a

  • SHA512

    1a4b8bdb28aeec322912fdd0fb18e9a15dd5b3855cd21c7766047953e7b5b4315a089270c17d616efe4b901a62e255be51d695068f755df7ad7b7cad3815ae42

  • SSDEEP

    12288:3Mr0y90PFSmzgmHfN1smz4cuIcmBFTvfpXj6k8EQLnEUIui1sGWCoK+zdjy:jy85gu5buIcmBFTvBTp8EQLnERF1WCo6

Malware Config

Extracted

Family

redline

Botnet

dars

C2

83.97.73.127:19045

Attributes
  • auth_value

    7cd208e6b6c927262304d5d4d88647fd

Targets

    • Target

      75425bae3bb52062a957b0d26bf5b0291e76c61a88746cd10ae300643322672a

    • Size

      756KB

    • MD5

      9fb81d5df5482d9345a669c97dd15922

    • SHA1

      bdfcd981ed07accd5a148a6a7a553f6f45afed90

    • SHA256

      75425bae3bb52062a957b0d26bf5b0291e76c61a88746cd10ae300643322672a

    • SHA512

      1a4b8bdb28aeec322912fdd0fb18e9a15dd5b3855cd21c7766047953e7b5b4315a089270c17d616efe4b901a62e255be51d695068f755df7ad7b7cad3815ae42

    • SSDEEP

      12288:3Mr0y90PFSmzgmHfN1smz4cuIcmBFTvfpXj6k8EQLnEUIui1sGWCoK+zdjy:jy85gu5buIcmBFTvBTp8EQLnERF1WCo6

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks