General

  • Target

    8a7f8c0259749086a5f013368b9f7ace8d3699306f4beb2be248033375fd7564

  • Size

    581KB

  • Sample

    230605-bxcjlaed93

  • MD5

    72a13ece4130c5f1ceda92efad69e6e7

  • SHA1

    97651bf1ac3de3e783847b8389423ad0e6ef8826

  • SHA256

    8a7f8c0259749086a5f013368b9f7ace8d3699306f4beb2be248033375fd7564

  • SHA512

    6bd3162418447eaff750989ba62cdc5776a723c243bbc3cf8535ebac0cee7bafb2a366f969981287270f3cd476400f93f2f8e84e45c76c17396e83f4ee336fc2

  • SSDEEP

    12288:0MrFy90cBwhhljada53nOmh27bDDKkMgnk7bGLA1G1liKer:py9Bmbada53OJnDDKl57bGLA1DKer

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.126:19046

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Targets

    • Target

      8a7f8c0259749086a5f013368b9f7ace8d3699306f4beb2be248033375fd7564

    • Size

      581KB

    • MD5

      72a13ece4130c5f1ceda92efad69e6e7

    • SHA1

      97651bf1ac3de3e783847b8389423ad0e6ef8826

    • SHA256

      8a7f8c0259749086a5f013368b9f7ace8d3699306f4beb2be248033375fd7564

    • SHA512

      6bd3162418447eaff750989ba62cdc5776a723c243bbc3cf8535ebac0cee7bafb2a366f969981287270f3cd476400f93f2f8e84e45c76c17396e83f4ee336fc2

    • SSDEEP

      12288:0MrFy90cBwhhljada53nOmh27bDDKkMgnk7bGLA1G1liKer:py9Bmbada53OJnDDKl57bGLA1DKer

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Windows security modification

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks