General

  • Target

    077ae7c99c7e1837764942d288608479d1540a621dd391b7ef47b8cbfed150ed

  • Size

    753KB

  • Sample

    230601-3gp9ashd2t

  • MD5

    ee555a95d8aa2ec84d67803e4859d848

  • SHA1

    c6b145cb9c0f0d3b7600d0773c1dedcfff02d804

  • SHA256

    077ae7c99c7e1837764942d288608479d1540a621dd391b7ef47b8cbfed150ed

  • SHA512

    96d26d14958289d2e8a9b3719d5005bbac745a28c15dbb2bae8f2cfd11b51321ca098651d561899c229f4a4d73ad50c578176e0c7d33ead0d26f71a0090c0239

  • SSDEEP

    12288:2MrPy90AVHiI7jsmcYTe09Nscuj611GuXAitEbR4Won/XG9w:lytV/7jns/GwitE14Wrw

Malware Config

Extracted

Family

redline

Botnet

mars

C2

83.97.73.127:19045

Attributes
  • auth_value

    91bd3682cfb50cdc64b6009eb977b766

Targets

    • Target

      077ae7c99c7e1837764942d288608479d1540a621dd391b7ef47b8cbfed150ed

    • Size

      753KB

    • MD5

      ee555a95d8aa2ec84d67803e4859d848

    • SHA1

      c6b145cb9c0f0d3b7600d0773c1dedcfff02d804

    • SHA256

      077ae7c99c7e1837764942d288608479d1540a621dd391b7ef47b8cbfed150ed

    • SHA512

      96d26d14958289d2e8a9b3719d5005bbac745a28c15dbb2bae8f2cfd11b51321ca098651d561899c229f4a4d73ad50c578176e0c7d33ead0d26f71a0090c0239

    • SSDEEP

      12288:2MrPy90AVHiI7jsmcYTe09Nscuj611GuXAitEbR4Won/XG9w:lytV/7jns/GwitE14Wrw

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks