General

  • Target

    9660c4527b4a9f723923ff38dd7a25856a9cd99a82ca8b531cf2dd21407262a0

  • Size

    852KB

  • Sample

    230604-ygx7paeb2w

  • MD5

    c535f9a20e13df8c4573fe17b17722ac

  • SHA1

    0507a6d03a9716bc32ee6fcef147a98c9c11b908

  • SHA256

    9660c4527b4a9f723923ff38dd7a25856a9cd99a82ca8b531cf2dd21407262a0

  • SHA512

    8184db711d728982ce501e6ba2130fbc1c5dc36d043f627804088bc322962b9d33fed5f4f3b7288708d112685418391771bbbaf24249c66276b920f6513da5d2

  • SSDEEP

    12288:AMrJy90RwYoK3unZP1YSSuvJ/Oes2YDNH7RG42W89bvAGKwVXLY02tgPPT:Zykc3YSvB/OWiL3898GFbY024r

Malware Config

Extracted

Family

redline

Botnet

lupa

C2

83.97.73.126:19046

Attributes
  • auth_value

    6a764aa41830c77712442516d143bc9c

Targets

    • Target

      9660c4527b4a9f723923ff38dd7a25856a9cd99a82ca8b531cf2dd21407262a0

    • Size

      852KB

    • MD5

      c535f9a20e13df8c4573fe17b17722ac

    • SHA1

      0507a6d03a9716bc32ee6fcef147a98c9c11b908

    • SHA256

      9660c4527b4a9f723923ff38dd7a25856a9cd99a82ca8b531cf2dd21407262a0

    • SHA512

      8184db711d728982ce501e6ba2130fbc1c5dc36d043f627804088bc322962b9d33fed5f4f3b7288708d112685418391771bbbaf24249c66276b920f6513da5d2

    • SSDEEP

      12288:AMrJy90RwYoK3unZP1YSSuvJ/Oes2YDNH7RG42W89bvAGKwVXLY02tgPPT:Zykc3YSvB/OWiL3898GFbY024r

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks